IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_ad08eff1-d069-4d3e-ad86-61be7f6cb8c0.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_ad08eff1-d069-4d3e-ad86-61be7f6cb8c0.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs-1.js
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js (copy)
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2212 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65155996-2b93-46e9-ae4e-1c1110218147} 7488 "\\.\pipe\gecko-crash-server-pipe.7488" 192f6c70710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3696 -parentBuildID 20230927232528 -prefsHandle 3760 -prefMapHandle 1472 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ddfb0ec-930d-44cc-b925-82879c9ace8a} 7488 "\\.\pipe\gecko-crash-server-pipe.7488" 19289111510 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4972 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4968 -prefMapHandle 4952 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90187dd2-4e8f-474f-9614-3c8c610e39d8} 7488 "\\.\pipe\gecko-crash-server-pipe.7488" 19288829510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
http://mozilla.org/#/properties/proposedEnrollment
unknown
http://detectportal.firefox.com/
unknown
http://mozilla.org/#/properties/branches/anyOf/1http://mozilla.org/#/properties/targeting
unknown
http://mozilla.org/#/properties/schemaVersion
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
http://mozilla.org/#/properties/quickSuggestRemoteSettingsDataType
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
http://mozilla.org/#/properties/quickSuggestBlockingEnabledhttp://mozilla.org/#/properties/quickSugg
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://mozilla.org/#/properties/userFacingName
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredEnabled
unknown
https://github.com/mozilla-services/screenshots
unknown
http://mozilla.org/#/properties/proposedDurationhttp://mozilla.org/#/properties/startDatehttp://mozi
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://mozilla.org/#/properties/outcomes/items
unknown
http://mozilla.org/#/properties/quickSuggestSponsoredIndex
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
http://exslt.org/common
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
http://exslt.org/dates-and-times
unknown
http://mozilla.org/#/properties/csvImport
unknown
http://mozilla.org/#/properties/quickSuggestAllowPositionInSuggestions
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
unknown
https://MD8.mozilla.org/1/m
unknown
http://mozilla.org/#/properties/featureIds/itemshttp://mozilla.org/#/properties/branches
unknown
http://mozilla.org/#/properties/quickSuggestImpressionCapsSponsoredEnabled
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
unknown
http://mozilla.org/#/properties/endDate
unknown
http://mozilla.org/#/properties/addonsFeatureGate
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
http://mozilla.org/#/properties/addonsShowLessFrequentlyCap
unknown
http://mozilla.org/#/properties/autoFillAdaptiveHistoryEnabled
unknown
http://mozilla.org/#/properties/autoFillAdaptiveHistoryMinCharsThresholdhttp://mozilla.org/#/propert
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/#/properties/bucketConfig/properties/randomizationUnithttp://mozilla.org/#/proper
unknown
http://mozilla.org/#/properties/enrollmentEndDate
unknown
http://mozilla.org/#/properties/proposedDurationhttp://mozilla.org/#/properties/startDate
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
http://mozilla.org/#/properties/autoFillAdaptiveHistoryMinCharsThreshold
unknown
http://mozilla.org/#/properties/outcomes
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
http://mozilla.org/#/properties/quickSuggestShouldShowOnboardingDialoghttp://mozilla.org/#/propertie
unknown
http://mozilla.org/#/properties/bucketConfig/properties/namespacehttp://mozilla.org/#/properties/out
unknown
https://identity.mozilla.com/apps/relay
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://gpuweb.github.io/gpuweb/
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/value/ad
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://www.olx.pl/
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/ratio
unknown
http://mozilla.org/#/properties/bucketConfig/properties/starthttp://mozilla.org/#/properties/bucketC
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
https://watch.sling.com/
unknown
http://mozilla.org/#/properties/isEnrollmentPausedA
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
http://mozilla.org/#/properties/quickSuggestShouldShowOnboardingDialog
unknown
http://mozilla.org/#/properties/appId
unknown
https://www.google.com/complete/
unknown
https://developer.mozilla.org/docs/Web/API/Element/setPointerCaptureElementReleaseCaptureWarningElem
unknown
https://webextensions.settings.services.mozilla.com/v1
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://addons.mozilla.org/%LOCALE%/firefox/
unknown
http://json-schema.org/draft-06/schema#
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items
unknown
http://mozilla.org/#/properties/quickSuggestImpressionCapsNonSponsoredEnabled
unknown
http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
unknown
https://spocs.getpocket.com
unknown
https://developers.google.com/safe-browsing/v4/advisory
unknown
http://json-schema.org/draft-07/schema#Array
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.19.174
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
192FDA70000
heap
page read and write
192884B0000
trusted library allocation
page read and write
1928F2AC000
trusted library allocation
page read and write
19286C9C000
trusted library allocation
page read and write
192843FE000
heap
page read and write
19283DBC000
trusted library allocation
page read and write
192FDA78000
heap
page read and write
1928F2C2000
trusted library allocation
page read and write
192911C5000
trusted library allocation
page read and write
19292DD1000
trusted library allocation
page read and write
192887BD000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192887ED000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
19288B00000
trusted library allocation
page read and write
1928F44A000
trusted library allocation
page read and write
1928931B000
trusted library allocation
page read and write
19292BAC000
trusted library allocation
page read and write
1928435A000
heap
page read and write
1928F3B0000
trusted library allocation
page read and write
19288674000
trusted library allocation
page read and write
17838912000
trusted library allocation
page read and write
1DB99D97000
heap
page read and write
19290AA8000
trusted library allocation
page read and write
19288BF8000
trusted library allocation
page read and write
1928F479000
trusted library allocation
page read and write
192FDA8A000
heap
page read and write
19292BC3000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
192881A8000
trusted library allocation
page read and write
19292BAC000
trusted library allocation
page read and write
192881E1000
trusted library allocation
page read and write
192873B0000
trusted library allocation
page read and write
19288282000
trusted library allocation
page read and write
192FDA1E000
heap
page read and write
39AB23E000
stack
page read and write
1928A45F000
trusted library allocation
page read and write
19287315000
trusted library allocation
page read and write
1783877B000
trusted library allocation
page read and write
19288895000
trusted library allocation
page read and write
192881C8000
trusted library allocation
page read and write
192FDA6C000
heap
page read and write
192FDA20000
heap
page read and write
192887C3000
trusted library allocation
page read and write
39ACA7E000
stack
page read and write
19287051000
trusted library allocation
page read and write
22278024000
trusted library allocation
page read and write
19288228000
trusted library allocation
page read and write
192FDAA1000
heap
page read and write
19292D63000
trusted library allocation
page read and write
192FDA28000
heap
page read and write
1928819E000
trusted library allocation
page read and write
1928FCB9000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928FC70000
trusted library allocation
page read and write
19293362000
heap
page read and write
192893F0000
trusted library allocation
page read and write
19288799000
trusted library allocation
page read and write
19290AA5000
trusted library allocation
page read and write
192FFC2D000
trusted library allocation
page read and write
192873B0000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192FDA1E000
heap
page read and write
192FDA8A000
heap
page read and write
192911C3000
trusted library allocation
page read and write
19284374000
heap
page read and write
1928F286000
trusted library allocation
page read and write
192900A0000
trusted library allocation
page read and write
192887F2000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
1928BD02000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
19292DBC000
trusted library allocation
page read and write
19287039000
trusted library allocation
page read and write
192884A2000
trusted library allocation
page read and write
1928EF87000
trusted library allocation
page read and write
192911D3000
trusted library allocation
page read and write
19288217000
trusted library allocation
page read and write
192FDA65000
heap
page read and write
19292D41000
trusted library allocation
page read and write
1928FCB9000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192889A1000
trusted library allocation
page read and write
192884C3000
trusted library allocation
page read and write
17838300000
unclassified section
page readonly
192FDA83000
heap
page read and write
192FDA83000
heap
page read and write
192FDA22000
heap
page read and write
192927FD000
trusted library allocation
page read and write
258DFFF000
stack
page read and write
19292D80000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19287390000
trusted library allocation
page read and write
1928F3E9000
trusted library allocation
page read and write
192FDA0A000
heap
page read and write
19283DF6000
trusted library allocation
page read and write
1928AC86000
trusted library allocation
page read and write
19284375000
heap
page read and write
192887E2000
trusted library allocation
page read and write
192FDA83000
heap
page read and write
192FDA81000
heap
page read and write
19288745000
trusted library allocation
page read and write
1928A4BE000
trusted library allocation
page read and write
19288769000
trusted library allocation
page read and write
223A8600000
trusted library allocation
page read and write
192900CB000
trusted library allocation
page read and write
192911ED000
trusted library allocation
page read and write
19292DE9000
trusted library allocation
page read and write
192FDA20000
heap
page read and write
1928F07A000
trusted library allocation
page read and write
19286CAD000
trusted library allocation
page read and write
192FFF26000
trusted library allocation
page read and write
19292DE2000
trusted library allocation
page read and write
19288683000
trusted library allocation
page read and write
1928F131000
trusted library allocation
page read and write
1928A7A3000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
19292CE6000
trusted library allocation
page read and write
192FDA9E000
heap
page read and write
192931C7000
trusted library allocation
page read and write
19292C21000
trusted library allocation
page read and write
D78000
heap
page read and write
19290054000
trusted library allocation
page read and write
19286BD6000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
17838390000
unclassified section
page readonly
192874FB000
trusted library allocation
page read and write
192FDA51000
heap
page read and write
19286F81000
trusted library allocation
page read and write
192931C6000
trusted library allocation
page read and write
192FDA96000
heap
page read and write
1928F654000
trusted library allocation
page read and write
2227805D000
trusted library allocation
page read and write
192881C8000
trusted library allocation
page read and write
19284357000
heap
page read and write
19290A50000
trusted library allocation
page read and write
19288185000
trusted library allocation
page read and write
192887ED000
trusted library allocation
page read and write
1928A4EE000
trusted library allocation
page read and write
27F090E8000
heap
page read and write
19290AA5000
trusted library allocation
page read and write
19286BD6000
trusted library allocation
page read and write
192927F1000
trusted library allocation
page read and write
192909E8000
trusted library allocation
page read and write
1928F0A1000
trusted library allocation
page read and write
258EFFF000
stack
page read and write
19290AF3000
trusted library allocation
page read and write
192FDA7D000
heap
page read and write
19292DE4000
trusted library allocation
page read and write
19293292000
trusted library allocation
page read and write
192FFBC3000
trusted library allocation
page read and write
19283D60000
trusted library allocation
page read and write
17838909000
trusted library allocation
page read and write
192912AA000
trusted library allocation
page read and write
19289223000
trusted library allocation
page read and write
22277D1D000
remote allocation
page execute read
192909DD000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
192FDA83000
heap
page read and write
27F09060000
heap
page read and write
192FDA0A000
heap
page read and write
19290786000
trusted library allocation
page read and write
19290A41000
trusted library allocation
page read and write
19289692000
trusted library allocation
page read and write
19286718000
trusted library allocation
page read and write
1928864C000
trusted library allocation
page read and write
19287381000
trusted library allocation
page read and write
192886AB000
trusted library allocation
page read and write
1928FC85000
trusted library allocation
page read and write
1928A17F000
trusted library allocation
page read and write
1928F4F3000
trusted library allocation
page read and write
19293AAC000
trusted library allocation
page read and write
1929315C000
trusted library allocation
page read and write
19288478000
trusted library allocation
page read and write
1928F5A2000
trusted library allocation
page read and write
1929335A000
heap
page read and write
39A9FFE000
unkown
page readonly
1928878B000
trusted library allocation
page read and write
1928A1FD000
trusted library allocation
page read and write
19292717000
trusted library allocation
page read and write
1928867E000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
514000
unkown
page readonly
1928AC06000
trusted library allocation
page read and write
19288B83000
trusted library allocation
page read and write
19292D9A000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
D9B000
heap
page read and write
19286CD4000
trusted library allocation
page read and write
192FDA83000
heap
page read and write
27F09159000
heap
page read and write
19290A97000
trusted library allocation
page read and write
1928A8C5000
trusted library allocation
page read and write
1928F1CD000
trusted library allocation
page read and write
192FFC6F000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
19288745000
trusted library allocation
page read and write
1928F1F4000
trusted library allocation
page read and write
192FFB5F000
trusted library allocation
page read and write
192FDA1E000
heap
page read and write
1928810B000
trusted library allocation
page read and write
19288656000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
1928FCC3000
trusted library allocation
page read and write
19292D83000
trusted library allocation
page read and write
1928A46D000
trusted library allocation
page read and write
1928F23F000
trusted library allocation
page read and write
1928F0A8000
trusted library allocation
page read and write
19288199000
trusted library allocation
page read and write
192FFFAC000
trusted library allocation
page read and write
19288C8F000
trusted library allocation
page read and write
192887CD000
trusted library allocation
page read and write
1928868C000
trusted library allocation
page read and write
192FFC61000
trusted library allocation
page read and write
19292BC3000
trusted library allocation
page read and write
19284383000
heap
page read and write
19283CB0000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
2227801A000
trusted library allocation
page read and write
19288760000
trusted library allocation
page read and write
19292C76000
trusted library allocation
page read and write
1928819B000
trusted library allocation
page read and write
192FFC8A000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19284380000
heap
page read and write
1928EF69000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192FFC11000
trusted library allocation
page read and write
1928F32B000
trusted library allocation
page read and write
19290AAB000
trusted library allocation
page read and write
192886EF000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1929315C000
trusted library allocation
page read and write
19292DD1000
trusted library allocation
page read and write
19288A86000
trusted library allocation
page read and write
192932A5000
trusted library allocation
page read and write
192893AF000
trusted library allocation
page read and write
192909E3000
trusted library allocation
page read and write
19283DF1000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
1A50000
heap
page read and write
1928819E000
trusted library allocation
page read and write
19289389000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
1928F3FD000
trusted library allocation
page read and write
192932AF000
trusted library allocation
page read and write
2227808F000
trusted library allocation
page read and write
1928EFC9000
trusted library allocation
page read and write
1928736F000
trusted library allocation
page read and write
1928F24A000
trusted library allocation
page read and write
192927F1000
trusted library allocation
page read and write
1928874E000
trusted library allocation
page read and write
19288175000
trusted library allocation
page read and write
19292DD1000
trusted library allocation
page read and write
192FFDD4000
trusted library allocation
page read and write
27F09145000
heap
page read and write
192FDA54000
heap
page read and write
192FDA5C000
heap
page read and write
19287312000
trusted library allocation
page read and write
1929335D000
heap
page read and write
19292D8A000
trusted library allocation
page read and write
192873BF000
trusted library allocation
page read and write
1928FC70000
trusted library allocation
page read and write
19286CFC000
trusted library allocation
page read and write
192881A5000
trusted library allocation
page read and write
19290936000
trusted library allocation
page read and write
192931DE000
trusted library allocation
page read and write
1929009C000
trusted library allocation
page read and write
1928736B000
trusted library allocation
page read and write
27F0835F000
trusted library allocation
page read and write
1928F0AE000
trusted library allocation
page read and write
1928A784000
trusted library allocation
page read and write
27F084B6000
heap
page read and write
1929007A000
trusted library allocation
page read and write
19288613000
trusted library allocation
page read and write
192FFC8A000
trusted library allocation
page read and write
192FDA2B000
heap
page read and write
19286BA7000
trusted library allocation
page read and write
1928A10C000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
17838768000
trusted library allocation
page read and write
19292B69000
trusted library allocation
page read and write
192911A1000
trusted library allocation
page read and write
192907D9000
trusted library allocation
page read and write
192867D9000
trusted library allocation
page read and write
19284374000
heap
page read and write
19293357000
heap
page read and write
19286C71000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
1928EF65000
trusted library allocation
page read and write
192887C9000
trusted library allocation
page read and write
19288A94000
trusted library allocation
page read and write
22278303000
trusted library allocation
page read and write
19288BEF000
trusted library allocation
page read and write
1928F5AA000
trusted library allocation
page read and write
1928696A000
trusted library allocation
page read and write
19286BA0000
trusted library allocation
page read and write
223A8460000
heap
page read and write
192884A7000
trusted library allocation
page read and write
1928A8A7000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192FDA80000
heap
page read and write
192887BD000
trusted library allocation
page read and write
1929335D000
heap
page read and write
19287390000
trusted library allocation
page read and write
192874F8000
trusted library allocation
page read and write
192FFCE2000
trusted library allocation
page read and write
192FFC69000
trusted library allocation
page read and write
192FFEFE000
trusted library allocation
page read and write
1929312D000
trusted library allocation
page read and write
1929333A000
heap
page read and write
192FDA22000
heap
page read and write
1928822B000
trusted library allocation
page read and write
19292DBC000
trusted library allocation
page read and write
19284380000
heap
page read and write
1928F284000
trusted library allocation
page read and write
192883E9000
trusted library allocation
page read and write
19288770000
trusted library allocation
page read and write
F8925D8000
stack
page read and write
19293292000
trusted library allocation
page read and write
19289322000
trusted library allocation
page read and write
1928F5B1000
trusted library allocation
page read and write
192873FB000
trusted library allocation
page read and write
1928F2BC000
trusted library allocation
page read and write
19290A54000
trusted library allocation
page read and write
192887FD000
trusted library allocation
page read and write
192FDA6E000
heap
page read and write
192FDA75000
heap
page read and write
192909FD000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
3320000
heap
page read and write
1928895B000
trusted library allocation
page read and write
1929329D000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
1928A86D000
trusted library allocation
page read and write
192932A5000
trusted library allocation
page read and write
5F4000
heap
page read and write
17838703000
trusted library allocation
page read and write
192FDA8F000
heap
page read and write
1928F24A000
trusted library allocation
page read and write
27F0916A000
heap
page read and write
1928730F000
trusted library allocation
page read and write
19290A4E000
trusted library allocation
page read and write
19284360000
heap
page read and write
192FDA62000
heap
page read and write
19289263000
trusted library allocation
page read and write
1928A7E5000
trusted library allocation
page read and write
22277DA0000
heap
page read and write
1929334C000
heap
page read and write
192FDA50000
heap
page read and write
192FDA0B000
heap
page read and write
1928F5BE000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
19287059000
trusted library allocation
page read and write
19292D63000
trusted library allocation
page read and write
19283CAA000
trusted library allocation
page read and write
192887F2000
trusted library allocation
page read and write
22277D00000
remote allocation
page read and write
1929335D000
heap
page read and write
192907E8000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
1928738A000
trusted library allocation
page read and write
19292DC5000
trusted library allocation
page read and write
1928A12D000
trusted library allocation
page read and write
192FFF5D000
trusted library allocation
page read and write
1928A3E4000
trusted library allocation
page read and write
192FFEF6000
trusted library allocation
page read and write
19290AAB000
trusted library allocation
page read and write
1929004E000
trusted library allocation
page read and write
192FDACF000
heap
page read and write
19290A45000
trusted library allocation
page read and write
1928FC12000
trusted library allocation
page read and write
1929324E000
trusted library allocation
page read and write
1928F1EC000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
1928FCA4000
trusted library allocation
page read and write
19292B9F000
trusted library allocation
page read and write
1928F5CA000
trusted library allocation
page read and write
19286CB4000
trusted library allocation
page read and write
19288A91000
trusted library allocation
page read and write
19286CD4000
trusted library allocation
page read and write
19287E77000
trusted library allocation
page read and write
39ABA7E000
stack
page read and write
1928809C000
trusted library allocation
page read and write
1928706F000
trusted library allocation
page read and write
19286C49000
trusted library allocation
page read and write
19286CCD000
trusted library allocation
page read and write
192884C3000
trusted library allocation
page read and write
19288735000
trusted library allocation
page read and write
27F083BC000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
19283E22000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
1928928A000
trusted library allocation
page read and write
1928EFD9000
trusted library allocation
page read and write
192909EB000
trusted library allocation
page read and write
192893CE000
trusted library allocation
page read and write
19283D6C000
trusted library allocation
page read and write
1928FC1E000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
19292AC3000
trusted library allocation
page read and write
192887ED000
trusted library allocation
page read and write
1928A848000
trusted library allocation
page read and write
192FDA8A000
heap
page read and write
192FDA83000
heap
page read and write
192FFC43000
trusted library allocation
page read and write
1928415D000
trusted library allocation
page read and write
192896E6000
trusted library allocation
page read and write
19291290000
trusted library allocation
page read and write
1928A187000
trusted library allocation
page read and write
19284380000
heap
page read and write
1928F1EF000
trusted library allocation
page read and write
D91000
heap
page read and write
192889B6000
trusted library allocation
page read and write
192FDA70000
heap
page read and write
192FDAAE000
heap
page read and write
192FDA57000
heap
page read and write
192887F8000
trusted library allocation
page read and write
192907C6000
trusted library allocation
page read and write
22278066000
trusted library allocation
page read and write
1928F4F1000
trusted library allocation
page read and write
17838700000
trusted library allocation
page read and write
DAF000
heap
page read and write
192FDA2E000
heap
page read and write
19288766000
trusted library allocation
page read and write
27F0904D000
heap
page read and write
192887E3000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192881A8000
trusted library allocation
page read and write
192FDA0B000
heap
page read and write
1928707D000
trusted library allocation
page read and write
19289331000
trusted library allocation
page read and write
192FDA65000
heap
page read and write
192FDA6D000
heap
page read and write
1928A8AC000
trusted library allocation
page read and write
192869D4000
trusted library allocation
page read and write
192873A4000
trusted library allocation
page read and write
192933A0000
heap
page read and write
1928A3A6000
trusted library allocation
page read and write
1928F233000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
27F08442000
unclassified section
page read and write
441000
unkown
page execute read
1928F2BE000
trusted library allocation
page read and write
192931C2000
trusted library allocation
page read and write
192FDA7C000
heap
page read and write
192FDA6B000
heap
page read and write
192873E2000
trusted library allocation
page read and write
192933D2000
heap
page read and write
192843FE000
heap
page read and write
27F09178000
heap
page read and write
19290052000
trusted library allocation
page read and write
19286C5C000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
192900E5000
trusted library allocation
page read and write
19292A7C000
trusted library allocation
page read and write
1928F26C000
trusted library allocation
page read and write
1928A4EE000
trusted library allocation
page read and write
1928826C000
trusted library allocation
page read and write
19290AEF000
trusted library allocation
page read and write
27F090EB000
heap
page read and write
192909F8000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
19288743000
trusted library allocation
page read and write
19293A05000
trusted library allocation
page read and write
BDB000
stack
page read and write
19286CC1000
trusted library allocation
page read and write
222780DB000
trusted library allocation
page read and write
1928A476000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
192880C1000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
1928FCC5000
trusted library allocation
page read and write
19286E20000
trusted library allocation
page read and write
192893CA000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19292B69000
trusted library allocation
page read and write
19292D8A000
trusted library allocation
page read and write
192873FA000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
1928703D000
trusted library allocation
page read and write
19291282000
trusted library allocation
page read and write
192889A1000
trusted library allocation
page read and write
1928F0BF000
trusted library allocation
page read and write
19289314000
trusted library allocation
page read and write
19288993000
trusted library allocation
page read and write
1928FCF2000
trusted library allocation
page read and write
19290A38000
trusted library allocation
page read and write
19286B7F000
trusted library allocation
page read and write
19293361000
heap
page read and write
27F090E0000
heap
page read and write
27F083F3000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
1928F1E9000
trusted library allocation
page read and write
19289697000
trusted library allocation
page read and write
19292DA7000
trusted library allocation
page read and write
1928868A000
trusted library allocation
page read and write
19286EE9000
trusted library allocation
page read and write
27F090FC000
heap
page read and write
22278000000
trusted library allocation
page read and write
5F4000
heap
page read and write
192FDA11000
heap
page read and write
19292DBC000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
27F083BA000
trusted library allocation
page read and write
192FFB81000
trusted library allocation
page read and write
19293A93000
trusted library allocation
page read and write
19292D7A000
trusted library allocation
page read and write
19292CDB000
trusted library allocation
page read and write
1928EF7D000
trusted library allocation
page read and write
19288097000
trusted library allocation
page read and write
19288BDF000
trusted library allocation
page read and write
1928F0DF000
trusted library allocation
page read and write
192893BD000
trusted library allocation
page read and write
192873AC000
trusted library allocation
page read and write
192873A7000
trusted library allocation
page read and write
192FDAD2000
heap
page read and write
19289393000
trusted library allocation
page read and write
1928F0BF000
trusted library allocation
page read and write
19293191000
trusted library allocation
page read and write
192FDA38000
heap
page read and write
19290A31000
trusted library allocation
page read and write
1783891A000
trusted library allocation
page read and write
39AB27E000
unkown
page readonly
1928707B000
trusted library allocation
page read and write
1928F032000
trusted library allocation
page read and write
1929328C000
trusted library allocation
page read and write
19292BE5000
trusted library allocation
page read and write
19286C96000
trusted library allocation
page read and write
192FDA7E000
heap
page read and write
192FDA18000
heap
page read and write
27F090E9000
heap
page read and write
1928435C000
heap
page read and write
1928F23F000
trusted library allocation
page read and write
192887CD000
trusted library allocation
page read and write
27F09118000
heap
page read and write
2227840C000
trusted library allocation
page read and write
1929004C000
trusted library allocation
page read and write
5F0000
heap
page read and write
19287089000
trusted library allocation
page read and write
192FFEFB000
trusted library allocation
page read and write
19283D9D000
trusted library allocation
page read and write
19286BA0000
trusted library allocation
page read and write
19283D69000
trusted library allocation
page read and write
27F090A1000
heap
page read and write
192843FE000
heap
page read and write
19293362000
heap
page read and write
1928F1E0000
trusted library allocation
page read and write
19286726000
trusted library allocation
page read and write
19286CE2000
trusted library allocation
page read and write
1928967C000
trusted library allocation
page read and write
192883E7000
trusted library allocation
page read and write
192881E1000
trusted library allocation
page read and write
1928A1A3000
trusted library allocation
page read and write
19288786000
trusted library allocation
page read and write
1928FCA8000
trusted library allocation
page read and write
1928881D000
trusted library allocation
page read and write
1928FC08000
trusted library allocation
page read and write
19288A21000
trusted library allocation
page read and write
1928935B000
trusted library allocation
page read and write
192FDA80000
heap
page read and write
19287BF1000
trusted library allocation
page read and write
1928F380000
trusted library allocation
page read and write
1928A4E6000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FDA6E000
heap
page read and write
19284380000
heap
page read and write
192FDA64000
heap
page read and write
3350000
heap
page read and write
19287BFB000
trusted library allocation
page read and write
19286CFA000
trusted library allocation
page read and write
19286EF4000
trusted library allocation
page read and write
510000
unkown
page write copy
19288199000
trusted library allocation
page read and write
1928F1E6000
trusted library allocation
page read and write
1928F1EC000
trusted library allocation
page read and write
19291B00000
trusted library allocation
page read and write
1928F1DA000
trusted library allocation
page read and write
1928F5C4000
trusted library allocation
page read and write
192888EA000
trusted library allocation
page read and write
192FDA8A000
heap
page read and write
19292A42000
trusted library allocation
page read and write
19287BCB000
trusted library allocation
page read and write
27F09069000
heap
page read and write
27F0913C000
heap
page read and write
192FDA62000
heap
page read and write
1928435C000
heap
page read and write
192927E3000
trusted library allocation
page read and write
192FDA8B000
heap
page read and write
19287284000
trusted library allocation
page read and write
1928A478000
trusted library allocation
page read and write
19292DC5000
trusted library allocation
page read and write
19283D8E000
trusted library allocation
page read and write
192896A1000
trusted library allocation
page read and write
192FDA73000
heap
page read and write
19286CA4000
trusted library allocation
page read and write
1928F358000
trusted library allocation
page read and write
27F0832F000
trusted library allocation
page read and write
223A8700000
trusted library allocation
page read and write
27F090EB000
heap
page read and write
1928A4EA000
trusted library allocation
page read and write
19290ADD000
trusted library allocation
page read and write
1929335A000
heap
page read and write
192907AA000
trusted library allocation
page read and write
19284383000
heap
page read and write
192FDA79000
heap
page read and write
19290A4E000
trusted library allocation
page read and write
192907FD000
trusted library allocation
page read and write
19292DE4000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
19290A65000
trusted library allocation
page read and write
19293124000
trusted library allocation
page read and write
1928F689000
trusted library allocation
page read and write
1928A354000
trusted library allocation
page read and write
1929000D000
trusted library allocation
page read and write
1928703D000
trusted library allocation
page read and write
19292DE6000
trusted library allocation
page read and write
1928419A000
trusted library allocation
page read and write
27F0908A000
heap
page read and write
19288A58000
trusted library allocation
page read and write
19288629000
trusted library allocation
page read and write
19288225000
trusted library allocation
page read and write
192883BC000
trusted library allocation
page read and write
19292AC1000
trusted library allocation
page read and write
1928A334000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
1929334C000
heap
page read and write
19292D35000
trusted library allocation
page read and write
1DB9A0B5000
heap
page read and write
192884A6000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1929335A000
heap
page read and write
514000
unkown
page readonly
192FDA93000
heap
page read and write
19292DBA000
trusted library allocation
page read and write
19292C64000
trusted library allocation
page read and write
1928FCEE000
trusted library allocation
page read and write
27F09178000
heap
page read and write
1929335D000
heap
page read and write
19289320000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192907FA000
trusted library allocation
page read and write
19286C9C000
trusted library allocation
page read and write
1929335A000
heap
page read and write
192912F9000
trusted library allocation
page read and write
1928F069000
trusted library allocation
page read and write
19286B90000
trusted library allocation
page read and write
19290786000
trusted library allocation
page read and write
192887C9000
trusted library allocation
page read and write
19288199000
trusted library allocation
page read and write
19286CA1000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192FDA11000
heap
page read and write
19288BC9000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
192FFC38000
trusted library allocation
page read and write
1928FCBD000
trusted library allocation
page read and write
1928A4C8000
trusted library allocation
page read and write
192FFFD6000
trusted library allocation
page read and write
192881FB000
trusted library allocation
page read and write
192893BB000
trusted library allocation
page read and write
1928F233000
trusted library allocation
page read and write
DA8000
heap
page read and write
27F0912B000
heap
page read and write
1928A4BC000
trusted library allocation
page read and write
1928F3D7000
trusted library allocation
page read and write
192873BF000
trusted library allocation
page read and write
192873A6000
trusted library allocation
page read and write
19287457000
trusted library allocation
page read and write
19292D4B000
trusted library allocation
page read and write
19292C8E000
trusted library allocation
page read and write
1928F1F4000
trusted library allocation
page read and write
1928EF87000
trusted library allocation
page read and write
192FDA6C000
heap
page read and write
19286763000
trusted library allocation
page read and write
192932A5000
trusted library allocation
page read and write
19286971000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
F891B0C000
stack
page read and write
258DFFC000
stack
page read and write
192873D2000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192881E1000
trusted library allocation
page read and write
1928A3C1000
trusted library allocation
page read and write
27F090EB000
heap
page read and write
19288522000
trusted library allocation
page read and write
27F0912E000
heap
page read and write
192FFCDF000
trusted library allocation
page read and write
192887E8000
trusted library allocation
page read and write
1928A84D000
trusted library allocation
page read and write
19287356000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
19293197000
trusted library allocation
page read and write
17838747000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
1929328C000
trusted library allocation
page read and write
19289363000
trusted library allocation
page read and write
192909DD000
trusted library allocation
page read and write
19290A1A000
trusted library allocation
page read and write
27F08367000
trusted library allocation
page read and write
19288735000
trusted library allocation
page read and write
1929321F000
trusted library allocation
page read and write
19290A45000
trusted library allocation
page read and write
192887C9000
trusted library allocation
page read and write
1928731A000
trusted library allocation
page read and write
19286C3F000
trusted library allocation
page read and write
19283CC1000
trusted library allocation
page read and write
192927BA000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
1929315A000
trusted library allocation
page read and write
19289317000
trusted library allocation
page read and write
19292C27000
trusted library allocation
page read and write
192927D0000
trusted library allocation
page read and write
39A87D8000
stack
page read and write
1928696D000
trusted library allocation
page read and write
1928F6CD000
trusted library allocation
page read and write
1928F1CA000
trusted library allocation
page read and write
19292D88000
trusted library allocation
page read and write
1929333A000
heap
page read and write
192FDA21000
heap
page read and write
27F09159000
heap
page read and write
19290082000
trusted library allocation
page read and write
19292D8F000
trusted library allocation
page read and write
192888CD000
trusted library allocation
page read and write
192FDA75000
heap
page read and write
1928F413000
trusted library allocation
page read and write
192FDA7C000
heap
page read and write
19283D5F000
trusted library allocation
page read and write
19290AAE000
trusted library allocation
page read and write
192873FB000
trusted library allocation
page read and write
19287364000
trusted library allocation
page read and write
192FFFFE000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
1929325D000
trusted library allocation
page read and write
27F08312000
trusted library allocation
page read and write
192843FE000
heap
page read and write
19292DC5000
trusted library allocation
page read and write
192887D8000
trusted library allocation
page read and write
27F09069000
heap
page read and write
19287224000
trusted library allocation
page read and write
192873AE000
trusted library allocation
page read and write
19289399000
trusted library allocation
page read and write
1928AC2C000
trusted library allocation
page read and write
192884F6000
trusted library allocation
page read and write
19288BE9000
trusted library allocation
page read and write
192FDA79000
heap
page read and write
192FDA0B000
heap
page read and write
192927A5000
trusted library allocation
page read and write
1928F4F1000
trusted library allocation
page read and write
192FDA0B000
heap
page read and write
19290939000
trusted library allocation
page read and write
19290A4B000
trusted library allocation
page read and write
1928F1E0000
trusted library allocation
page read and write
192873AC000
trusted library allocation
page read and write
192907F0000
trusted library allocation
page read and write
19283D9A000
trusted library allocation
page read and write
27F09145000
heap
page read and write
192FDA85000
heap
page read and write
192FDA5A000
heap
page read and write
19290AD0000
trusted library allocation
page read and write
192FDA0A000
heap
page read and write
192909E3000
trusted library allocation
page read and write
1928A198000
trusted library allocation
page read and write
22278307000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928437D000
heap
page read and write
192FDA65000
heap
page read and write
192882B1000
trusted library allocation
page read and write
DC0000
heap
page read and write
19289357000
trusted library allocation
page read and write
1928F45B000
trusted library allocation
page read and write
27F090EB000
heap
page read and write
19286BD6000
trusted library allocation
page read and write
192FDA82000
heap
page read and write
192FDA8F000
heap
page read and write
19288BE9000
trusted library allocation
page read and write
192FDA32000
heap
page read and write
1928812A000
trusted library allocation
page read and write
1928A46A000
trusted library allocation
page read and write
19290ACB000
trusted library allocation
page read and write
27F09178000
heap
page read and write
19286F90000
trusted library allocation
page read and write
1929324C000
trusted library allocation
page read and write
27F0912B000
heap
page read and write
192932AA000
trusted library allocation
page read and write
27F0906C000
heap
page read and write
192FDA63000
heap
page read and write
1928F1E9000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
19292D99000
trusted library allocation
page read and write
1928A7E5000
trusted library allocation
page read and write
F891A8B000
stack
page read and write
192912AE000
trusted library allocation
page read and write
19286978000
trusted library allocation
page read and write
19290A73000
trusted library allocation
page read and write
17838572000
unclassified section
page read and write
1DB9A107000
trusted library allocation
page read and write
192FFFE0000
trusted library allocation
page read and write
27F090E3000
heap
page read and write
1929317F000
trusted library allocation
page read and write
192FDA78000
heap
page read and write
27F0830C000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192FDA26000
heap
page read and write
1928F5A2000
trusted library allocation
page read and write
19293181000
trusted library allocation
page read and write
192FDA79000
heap
page read and write
1929316A000
trusted library allocation
page read and write
156E000
stack
page read and write
17838712000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
19292D91000
trusted library allocation
page read and write
1928708D000
trusted library allocation
page read and write
19289660000
trusted library allocation
page read and write
19292DCC000
trusted library allocation
page read and write
192887C3000
trusted library allocation
page read and write
19288731000
trusted library allocation
page read and write
19286BA0000
trusted library allocation
page read and write
192887E2000
trusted library allocation
page read and write
192897CF000
trusted library allocation
page read and write
1DB99EA0000
heap
page read and write
19292DC5000
trusted library allocation
page read and write
19292DFC000
trusted library allocation
page read and write
1928A80C000
trusted library allocation
page read and write
222780B2000
trusted library allocation
page read and write
1928EFD6000
trusted library allocation
page read and write
192884E0000
trusted library allocation
page read and write
192887E3000
trusted library allocation
page read and write
19288163000
trusted library allocation
page read and write
1783875B000
trusted library allocation
page read and write
19293250000
trusted library allocation
page read and write
192F6CF0000
trusted library allocation
page read and write
1928A901000
trusted library allocation
page read and write
39AA0F8000
stack
page read and write
19290A06000
trusted library allocation
page read and write
19284358000
heap
page read and write
192874DC000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
19283CC3000
trusted library allocation
page read and write
192FFBDF000
trusted library allocation
page read and write
19290AB6000
trusted library allocation
page read and write
D50000
heap
page read and write
192FDA8A000
heap
page read and write
19292DBA000
trusted library allocation
page read and write
1928877A000
trusted library allocation
page read and write
222780B5000
trusted library allocation
page read and write
1928733F000
trusted library allocation
page read and write
1928A7A2000
trusted library allocation
page read and write
777547E000
unkown
page readonly
192FDA75000
heap
page read and write
27F090F1000
heap
page read and write
192FDA78000
heap
page read and write
19292DBA000
trusted library allocation
page read and write
27F090F1000
heap
page read and write
1928F07E000
trusted library allocation
page read and write
17838914000
trusted library allocation
page read and write
19292BF1000
trusted library allocation
page read and write
1928FCBB000
trusted library allocation
page read and write
192FFCF0000
trusted library allocation
page read and write
19288415000
trusted library allocation
page read and write
223A84FF000
heap
page read and write
192873A0000
trusted library allocation
page read and write
19290A97000
trusted library allocation
page read and write
19292DCC000
trusted library allocation
page read and write
1928A76D000
trusted library allocation
page read and write
1928F2FC000
trusted library allocation
page read and write
192FDA83000
heap
page read and write
192FDA8B000
heap
page read and write
19292BD3000
trusted library allocation
page read and write
192867D1000
trusted library allocation
page read and write
1929279D000
trusted library allocation
page read and write
192873A0000
trusted library allocation
page read and write
192932A5000
trusted library allocation
page read and write
1928862B000
trusted library allocation
page read and write
1928F000000
trusted library allocation
page read and write
5F4000
heap
page read and write
36A1000
heap
page read and write
1928A126000
trusted library allocation
page read and write
1928F482000
trusted library allocation
page read and write
192873A9000
trusted library allocation
page read and write
19288BEB000
trusted library allocation
page read and write
27F07FF0000
unclassified section
page readonly
19286B6C000
trusted library allocation
page read and write
19290056000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
1928818A000
trusted library allocation
page read and write
1928437D000
heap
page read and write
1928EFAF000
trusted library allocation
page read and write
1928864C000
trusted library allocation
page read and write
1DB99D90000
heap
page read and write
1929000A000
trusted library allocation
page read and write
19292DF2000
trusted library allocation
page read and write
178388F0000
heap
page read and write
19286BD6000
trusted library allocation
page read and write
27F084B4000
heap
page read and write
4DC000
unkown
page readonly
192932AA000
trusted library allocation
page read and write
192884F6000
trusted library allocation
page read and write
192888D6000
trusted library allocation
page read and write
1928A807000
trusted library allocation
page read and write
19293362000
heap
page read and write
192884C3000
trusted library allocation
page read and write
19288C8A000
trusted library allocation
page read and write
192867FD000
trusted library allocation
page read and write
19286729000
trusted library allocation
page read and write
19292DC5000
trusted library allocation
page read and write
1928FC32000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
192932AF000
trusted library allocation
page read and write
192887CD000
trusted library allocation
page read and write
192FDA78000
heap
page read and write
192FFC86000
trusted library allocation
page read and write
19284383000
heap
page read and write
223A84A0000
heap
page read and write
192FDA51000
heap
page read and write
1928F14F000
trusted library allocation
page read and write
192884B9000
trusted library allocation
page read and write
192FDA88000
heap
page read and write
1928749F000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
19288EEF000
trusted library allocation
page read and write
19292BD3000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FFC87000
trusted library allocation
page read and write
19283CC8000
trusted library allocation
page read and write
192886AF000
trusted library allocation
page read and write
19286EE5000
trusted library allocation
page read and write
27F084B0000
heap
page read and write
19287B64000
trusted library allocation
page read and write
17838796000
trusted library allocation
page read and write
192884C3000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928698A000
trusted library allocation
page read and write
1928EF7D000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
192907FB000
trusted library allocation
page read and write
223A8480000
heap
page read and write
1928698E000
trusted library allocation
page read and write
192FDA0B000
heap
page read and write
192873C1000
trusted library allocation
page read and write
19292D46000
trusted library allocation
page read and write
1928867E000
trusted library allocation
page read and write
192FFB78000
trusted library allocation
page read and write
1928818F000
trusted library allocation
page read and write
19286C6F000
trusted library allocation
page read and write
1928EFD9000
trusted library allocation
page read and write
1928F2BE000
trusted library allocation
page read and write
1929000A000
trusted library allocation
page read and write
192887D9000
trusted library allocation
page read and write
192FFB88000
trusted library allocation
page read and write
192FDA86000
heap
page read and write
192907FA000
trusted library allocation
page read and write
19284360000
heap
page read and write
1928F147000
trusted library allocation
page read and write
19290A29000
trusted library allocation
page read and write
1928EF65000
trusted library allocation
page read and write
19292D8F000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
19283DC1000
trusted library allocation
page read and write
27F0912B000
heap
page read and write
192870F9000
trusted library allocation
page read and write
192FFF1A000
trusted library allocation
page read and write
1929129B000
trusted library allocation
page read and write
77753FE000
unkown
page readonly
192FDAAE000
heap
page read and write
19286ECF000
trusted library allocation
page read and write
1928F419000
trusted library allocation
page read and write
19292A5F000
trusted library allocation
page read and write
1928A79E000
trusted library allocation
page read and write
19286EF5000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192FFCAD000
trusted library allocation
page read and write
19286CE2000
trusted library allocation
page read and write
19288CB3000
trusted library allocation
page read and write
192927C8000
trusted library allocation
page read and write
1929318D000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
19292DBA000
trusted library allocation
page read and write
192880F7000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
192884B0000
trusted library allocation
page read and write
1928F5DF000
trusted library allocation
page read and write
192FDA7C000
heap
page read and write
192FDA4E000
heap
page read and write
502000
unkown
page readonly
192FDA4E000
heap
page read and write
223A84F0000
heap
page read and write
192FDA82000
heap
page read and write
1928705C000
trusted library allocation
page read and write
192887EC000
trusted library allocation
page read and write
19290A54000
trusted library allocation
page read and write
192870FC000
trusted library allocation
page read and write
192FDA7C000
heap
page read and write
1928F5E9000
trusted library allocation
page read and write
19292DCC000
trusted library allocation
page read and write
27F080D0000
heap
page read and write
1928A176000
trusted library allocation
page read and write
192911C5000
trusted library allocation
page read and write
DC6000
heap
page read and write
19293A67000
trusted library allocation
page read and write
19290A65000
trusted library allocation
page read and write
192911C3000
trusted library allocation
page read and write
17838798000
trusted library allocation
page read and write
192893C1000
trusted library allocation
page read and write
192881F6000
trusted library allocation
page read and write
1928EF79000
trusted library allocation
page read and write
1783840A000
heap
page read and write
192FDA6B000
heap
page read and write
19290AB6000
trusted library allocation
page read and write
192911DB000
trusted library allocation
page read and write
27F09118000
heap
page read and write
192FDA11000
heap
page read and write
19286978000
trusted library allocation
page read and write
192888A5000
trusted library allocation
page read and write
19290942000
trusted library allocation
page read and write
19292DE2000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
192FDA15000
heap
page read and write
192FDA16000
heap
page read and write
19292BE1000
trusted library allocation
page read and write
1928435C000
heap
page read and write
19286C54000
trusted library allocation
page read and write
19290A7D000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
27F09145000
heap
page read and write
27F09159000
heap
page read and write
192873C1000
trusted library allocation
page read and write
192FFC54000
trusted library allocation
page read and write
1928704A000
trusted library allocation
page read and write
DA0000
heap
page read and write
19292CCF000
trusted library allocation
page read and write
19288430000
trusted library allocation
page read and write
1928864C000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
1928FC0F000
trusted library allocation
page read and write
19293235000
trusted library allocation
page read and write
192FDA24000
heap
page read and write
192FDA4E000
heap
page read and write
192FDA96000
heap
page read and write
1929328C000
trusted library allocation
page read and write
192887AC000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
192927A5000
trusted library allocation
page read and write
19292BE5000
trusted library allocation
page read and write
192FDA6D000
heap
page read and write
192893E5000
trusted library allocation
page read and write
19286971000
trusted library allocation
page read and write
19284134000
trusted library allocation
page read and write
192881A9000
trusted library allocation
page read and write
19288943000
trusted library allocation
page read and write
1928F1BF000
trusted library allocation
page read and write
1928A7CE000
trusted library allocation
page read and write
192FFDC7000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
19290AA3000
trusted library allocation
page read and write
1928878B000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928866A000
trusted library allocation
page read and write
192886B0000
trusted library allocation
page read and write
19292D88000
trusted library allocation
page read and write
192FDA63000
heap
page read and write
1928F2BC000
trusted library allocation
page read and write
192FDA75000
heap
page read and write
19290A7D000
trusted library allocation
page read and write
19287089000
trusted library allocation
page read and write
1928A13C000
trusted library allocation
page read and write
19287074000
trusted library allocation
page read and write
178387C8000
trusted library allocation
page read and write
DAE000
heap
page read and write
1928F6B3000
trusted library allocation
page read and write
22278140000
heap
page read and write
192FDA0B000
heap
page read and write
19286E92000
trusted library allocation
page read and write
1928A4EA000
trusted library allocation
page read and write
1928A4C2000
trusted library allocation
page read and write
192FFF7E000
trusted library allocation
page read and write
192FDAAE000
heap
page read and write
192843FE000
heap
page read and write
192FDA74000
heap
page read and write
192887F6000
trusted library allocation
page read and write
1928849D000
trusted library allocation
page read and write
192FDAC5000
heap
page read and write
19292D68000
trusted library allocation
page read and write
192873A4000
trusted library allocation
page read and write
19288644000
trusted library allocation
page read and write
1928A848000
trusted library allocation
page read and write
1928709A000
trusted library allocation
page read and write
1960003F000
trusted library allocation
page read and write
1928F3D7000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192FDA81000
heap
page read and write
192873A1000
trusted library allocation
page read and write
192FDA96000
heap
page read and write
27F0905C000
heap
page read and write
1929335D000
heap
page read and write
19286C62000
trusted library allocation
page read and write
1928847F000
trusted library allocation
page read and write
19287034000
trusted library allocation
page read and write
19290A65000
trusted library allocation
page read and write
1928F1EC000
trusted library allocation
page read and write
19288913000
trusted library allocation
page read and write
1928437D000
heap
page read and write
1929004C000
trusted library allocation
page read and write
1928696A000
trusted library allocation
page read and write
192889A1000
trusted library allocation
page read and write
19293362000
heap
page read and write
192FFFA6000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
1928EF6D000
trusted library allocation
page read and write
192882A5000
trusted library allocation
page read and write
1928709A000
trusted library allocation
page read and write
192927FD000
trusted library allocation
page read and write
19292A9F000
trusted library allocation
page read and write
192FDA9E000
heap
page read and write
192873B4000
trusted library allocation
page read and write
192927D0000
trusted library allocation
page read and write
19287034000
trusted library allocation
page read and write
1928F441000
trusted library allocation
page read and write
27F09063000
heap
page read and write
19287083000
trusted library allocation
page read and write
19292BC3000
trusted library allocation
page read and write
27F0908A000
heap
page read and write
192FDA20000
heap
page read and write
1928F0B1000
trusted library allocation
page read and write
192883EB000
trusted library allocation
page read and write
192911C5000
trusted library allocation
page read and write
19287B55000
trusted library allocation
page read and write
192884EB000
trusted library allocation
page read and write
192FDA38000
heap
page read and write
192887E2000
trusted library allocation
page read and write
19286733000
trusted library allocation
page read and write
192887A9000
trusted library allocation
page read and write
19290A54000
trusted library allocation
page read and write
19291191000
trusted library allocation
page read and write
1929330E000
heap
page read and write
1929335D000
heap
page read and write
1929335D000
heap
page read and write
192911BE000
trusted library allocation
page read and write
192FDA6E000
heap
page read and write
19284372000
heap
page read and write
1928A92E000
trusted library allocation
page read and write
19287319000
trusted library allocation
page read and write
1928AC45000
trusted library allocation
page read and write
192892EC000
trusted library allocation
page read and write
1928F245000
trusted library allocation
page read and write
192927BA000
trusted library allocation
page read and write
192FDA8B000
heap
page read and write
19288090000
trusted library allocation
page read and write
19288199000
trusted library allocation
page read and write
19287362000
trusted library allocation
page read and write
1928F2BE000
trusted library allocation
page read and write
1928A3BE000
trusted library allocation
page read and write
19288974000
trusted library allocation
page read and write
7775D7E000
stack
page read and write
19286CD6000
trusted library allocation
page read and write
19286C9C000
trusted library allocation
page read and write
19286B80000
trusted library allocation
page read and write
1928F34D000
trusted library allocation
page read and write
192FDA6D000
heap
page read and write
19288182000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
1929335D000
heap
page read and write
19287E6F000
trusted library allocation
page read and write
39AA17E000
unkown
page readonly
192FDA1A000
heap
page read and write
192FDA5C000
heap
page read and write
1928F59D000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192907CF000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
22278068000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
19288855000
trusted library allocation
page read and write
19283DC7000
trusted library allocation
page read and write
1929119C000
trusted library allocation
page read and write
192FFCE2000
trusted library allocation
page read and write
192873FA000
trusted library allocation
page read and write
178387EB000
trusted library allocation
page read and write
19290AF0000
trusted library allocation
page read and write
192FDA6C000
heap
page read and write
192FDA85000
heap
page read and write
1928EF5D000
trusted library allocation
page read and write
27F09159000
heap
page read and write
192932AA000
trusted library allocation
page read and write
192FDA7D000
heap
page read and write
192893A2000
trusted library allocation
page read and write
192FDAAE000
heap
page read and write
19292DA7000
trusted library allocation
page read and write
19288953000
trusted library allocation
page read and write
222780A2000
trusted library allocation
page read and write
27F08A4A000
unkown
page execute read
BFD000
stack
page read and write
19286CF5000
trusted library allocation
page read and write
1928A86D000
trusted library allocation
page read and write
1928738E000
trusted library allocation
page read and write
D9E000
heap
page read and write
192FDA5C000
heap
page read and write
27F090E8000
heap
page read and write
1928F3C7000
trusted library allocation
page read and write
178383C0000
heap
page read and write
192889CB000
trusted library allocation
page read and write
1928EF9F000
trusted library allocation
page read and write
22278112000
unclassified section
page read and write
192873AC000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192FDA4E000
heap
page read and write
1928F28F000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
19284380000
heap
page read and write
1928FC07000
trusted library allocation
page read and write
192FDA73000
heap
page read and write
1928A8E4000
trusted library allocation
page read and write
192909FB000
trusted library allocation
page read and write
19283CC0000
trusted library allocation
page read and write
192886EF000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192867EF000
trusted library allocation
page read and write
192FDA75000
heap
page read and write
192873A0000
trusted library allocation
page read and write
19284380000
heap
page read and write
1928F343000
trusted library allocation
page read and write
19286C91000
trusted library allocation
page read and write
192927A3000
trusted library allocation
page read and write
192874B8000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192FFC0B000
trusted library allocation
page read and write
19288682000
trusted library allocation
page read and write
1928A136000
trusted library allocation
page read and write
19287083000
trusted library allocation
page read and write
19290AEE000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FDA81000
heap
page read and write
19290056000
trusted library allocation
page read and write
19292D6D000
trusted library allocation
page read and write
192FDA8B000
heap
page read and write
19286990000
trusted library allocation
page read and write
192873BF000
trusted library allocation
page read and write
192873BC000
trusted library allocation
page read and write
27F09064000
heap
page read and write
19287041000
trusted library allocation
page read and write
192927C4000
trusted library allocation
page read and write
19284357000
heap
page read and write
19288498000
trusted library allocation
page read and write
27F090F1000
heap
page read and write
27F09060000
heap
page read and write
1928844C000
trusted library allocation
page read and write
192873A4000
trusted library allocation
page read and write
F891ACE000
unkown
page readonly
19292D7A000
trusted library allocation
page read and write
1928F239000
trusted library allocation
page read and write
19290A58000
trusted library allocation
page read and write
19292DD7000
trusted library allocation
page read and write
1928897B000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
192FDA62000
heap
page read and write
192867FD000
trusted library allocation
page read and write
19286CE4000
trusted library allocation
page read and write
19290A4B000
trusted library allocation
page read and write
1928F0A1000
trusted library allocation
page read and write
1928937B000
trusted library allocation
page read and write
5F4000
heap
page read and write
19288A91000
trusted library allocation
page read and write
27F0906C000
heap
page read and write
1928847B000
trusted library allocation
page read and write
1928709A000
trusted library allocation
page read and write
19288BEF000
trusted library allocation
page read and write
192FDA28000
heap
page read and write
19292BAC000
trusted library allocation
page read and write
1928F34D000
trusted library allocation
page read and write
19286CD6000
trusted library allocation
page read and write
19292CC2000
trusted library allocation
page read and write
19288BF8000
trusted library allocation
page read and write
1928898B000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
19290A6E000
trusted library allocation
page read and write
19286CAD000
trusted library allocation
page read and write
192873AC000
trusted library allocation
page read and write
27F09060000
heap
page read and write
1928A4E6000
trusted library allocation
page read and write
19288783000
trusted library allocation
page read and write
27F08A4C000
unkown
page execute read
192FDA8A000
heap
page read and write
19284380000
heap
page read and write
19290953000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
19286B62000
trusted library allocation
page read and write
192FDA75000
heap
page read and write
19286763000
trusted library allocation
page read and write
19290A4E000
trusted library allocation
page read and write
19286BA0000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1928F243000
trusted library allocation
page read and write
192FDA79000
heap
page read and write
4DC000
unkown
page readonly
19286C94000
trusted library allocation
page read and write
192886EF000
trusted library allocation
page read and write
192FFCB5000
trusted library allocation
page read and write
DC6000
heap
page read and write
1928F2C2000
trusted library allocation
page read and write
27F090E8000
heap
page read and write
19288730000
trusted library allocation
page read and write
1928877A000
trusted library allocation
page read and write
192873B7000
trusted library allocation
page read and write
1928F032000
trusted library allocation
page read and write
1928A46A000
trusted library allocation
page read and write
19289355000
trusted library allocation
page read and write
192FFFAC000
trusted library allocation
page read and write
19286EE0000
trusted library allocation
page read and write
19293239000
trusted library allocation
page read and write
19286761000
trusted library allocation
page read and write
192FFF75000
trusted library allocation
page read and write
192907B4000
trusted library allocation
page read and write
19286CFA000
trusted library allocation
page read and write
DC9000
heap
page read and write
1928A8A7000
trusted library allocation
page read and write
19286C91000
trusted library allocation
page read and write
192909D4000
trusted library allocation
page read and write
1929314D000
trusted library allocation
page read and write
1928435C000
heap
page read and write
192927A5000
trusted library allocation
page read and write
192FFBEF000
trusted library allocation
page read and write
192874B0000
trusted library allocation
page read and write
C286DFE000
stack
page read and write
F580AFE000
trusted library allocation
page execute read
178388F4000
heap
page read and write
192FDA7D000
heap
page read and write
19290A49000
trusted library allocation
page read and write
192868A1000
trusted library allocation
page read and write
19287E93000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
27F09009000
heap
page read and write
DB0000
heap
page read and write
192FDA18000
heap
page read and write
19286EE5000
trusted library allocation
page read and write
192887C7000
trusted library allocation
page read and write
1928F5CA000
trusted library allocation
page read and write
192FFBA1000
trusted library allocation
page read and write
1928869D000
trusted library allocation
page read and write
1928A4C2000
trusted library allocation
page read and write
19284383000
heap
page read and write
192927B2000
trusted library allocation
page read and write
DBD000
heap
page read and write
1928F1A5000
trusted library allocation
page read and write
1928F1EF000
trusted library allocation
page read and write
1929009C000
trusted library allocation
page read and write
19284380000
heap
page read and write
1929005A000
trusted library allocation
page read and write
1928849D000
trusted library allocation
page read and write
192931D8000
trusted library allocation
page read and write
192884B0000
trusted library allocation
page read and write
27F08420000
heap
page readonly
1928F3F5000
trusted library allocation
page read and write
19290A97000
trusted library allocation
page read and write
19286CC1000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
19286CB8000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192FDA78000
heap
page read and write
192FDA20000
heap
page read and write
192888D3000
trusted library allocation
page read and write
1928F6F3000
trusted library allocation
page read and write
192FDA65000
heap
page read and write
39AD27E000
unkown
page readonly
192FFCF0000
trusted library allocation
page read and write
19287039000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
1928848A000
trusted library allocation
page read and write
19293A1C000
trusted library allocation
page read and write
19292D8A000
trusted library allocation
page read and write
1928F113000
trusted library allocation
page read and write
192886AB000
trusted library allocation
page read and write
1928F1DC000
trusted library allocation
page read and write
19293292000
trusted library allocation
page read and write
192884F6000
trusted library allocation
page read and write
27F090AA000
heap
page read and write
192FFCAD000
trusted library allocation
page read and write
19286BD6000
trusted library allocation
page read and write
BEF000
stack
page read and write
19290AC6000
trusted library allocation
page read and write
19292DDC000
trusted library allocation
page read and write
1928821D000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
19288492000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FFC65000
trusted library allocation
page read and write
19284360000
heap
page read and write
19293185000
trusted library allocation
page read and write
19286ECF000
trusted library allocation
page read and write
27F090F1000
heap
page read and write
19290A49000
trusted library allocation
page read and write
192FFF88000
trusted library allocation
page read and write
1928882C000
trusted library allocation
page read and write
19292D3D000
trusted library allocation
page read and write
19292DE2000
trusted library allocation
page read and write
19290A97000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
777757E000
unkown
page readonly
19292D44000
trusted library allocation
page read and write
19292C31000
trusted library allocation
page read and write
1928F1EC000
trusted library allocation
page read and write
19290A43000
trusted library allocation
page read and write
19292C92000
trusted library allocation
page read and write
1928A4F2000
trusted library allocation
page read and write
22278011000
trusted library allocation
page read and write
19284380000
heap
page read and write
27F09060000
heap
page read and write
192887E2000
trusted library allocation
page read and write
192882BA000
trusted library allocation
page read and write
19286CD9000
trusted library allocation
page read and write
19288BEF000
trusted library allocation
page read and write
19293138000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192900F1000
trusted library allocation
page read and write
17838772000
trusted library allocation
page read and write
19288175000
trusted library allocation
page read and write
192882BA000
trusted library allocation
page read and write
1929335A000
heap
page read and write
192FDA8B000
heap
page read and write
192FDA70000
heap
page read and write
192F6CE2000
trusted library allocation
page read and write
19283DD5000
trusted library allocation
page read and write
1928698A000
trusted library allocation
page read and write
192843FE000
heap
page read and write
1928FCBF000
trusted library allocation
page read and write
27F09069000
heap
page read and write
192867FD000
trusted library allocation
page read and write
1928A478000
trusted library allocation
page read and write
19288C8C000
trusted library allocation
page read and write
27F0835C000
trusted library allocation
page read and write
1928A3FA000
trusted library allocation
page read and write
19283DDD000
trusted library allocation
page read and write
192881F6000
trusted library allocation
page read and write
19289359000
trusted library allocation
page read and write
17838779000
trusted library allocation
page read and write
C2865FF000
stack
page read and write
19290AF9000
trusted library allocation
page read and write
1928704C000
trusted library allocation
page read and write
1929335D000
heap
page read and write
19286CD9000
trusted library allocation
page read and write
192FFB6A000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
19286CE2000
trusted library allocation
page read and write
1928FC12000
trusted library allocation
page read and write
19288783000
trusted library allocation
page read and write
19292DE9000
trusted library allocation
page read and write
192873A6000
trusted library allocation
page read and write
192FDA0C000
heap
page read and write
19286BA0000
trusted library allocation
page read and write
19288786000
trusted library allocation
page read and write
192886EF000
trusted library allocation
page read and write
17838920000
trusted library allocation
page read and write
192FDA38000
heap
page read and write
19292D91000
trusted library allocation
page read and write
192931A1000
trusted library allocation
page read and write
1928849D000
trusted library allocation
page read and write
19286BD6000
trusted library allocation
page read and write
36A0000
heap
page read and write
19290AA5000
trusted library allocation
page read and write
192FDA75000
heap
page read and write
19292D77000
trusted library allocation
page read and write
1928EF71000
trusted library allocation
page read and write
19288783000
trusted library allocation
page read and write
1928F6F3000
trusted library allocation
page read and write
19290773000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192873AC000
trusted library allocation
page read and write
1928F239000
trusted library allocation
page read and write
192874D1000
trusted library allocation
page read and write
19283D33000
trusted library allocation
page read and write
27F09122000
heap
page read and write
192FFFFE000
trusted library allocation
page read and write
19287B99000
trusted library allocation
page read and write
192FDA73000
heap
page read and write
192FDA81000
heap
page read and write
192FDA8A000
heap
page read and write
192FDA8A000
heap
page read and write
19283DBE000
trusted library allocation
page read and write
19283DBE000
trusted library allocation
page read and write
19288BAE000
trusted library allocation
page read and write
19290920000
trusted library allocation
page read and write
19289337000
trusted library allocation
page read and write
19283CDF000
trusted library allocation
page read and write
192888FB000
trusted library allocation
page read and write
1928F5DF000
trusted library allocation
page read and write
19286EFD000
trusted library allocation
page read and write
1928F5E3000
trusted library allocation
page read and write
192FDA7C000
heap
page read and write
192FFCDF000
trusted library allocation
page read and write
1783893F000
trusted library allocation
page read and write
192884B9000
trusted library allocation
page read and write
1929334D000
heap
page read and write
19288421000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
192FDA6B000
heap
page read and write
19287067000
trusted library allocation
page read and write
19292DFB000
trusted library allocation
page read and write
22278070000
trusted library allocation
page read and write
22277E10000
heap
page readonly
1929335D000
heap
page read and write
192FDA8A000
heap
page read and write
1928EF4C000
trusted library allocation
page read and write
1928F1DC000
trusted library allocation
page read and write
1928878B000
trusted library allocation
page read and write
19289644000
trusted library allocation
page read and write
1929329D000
trusted library allocation
page read and write
192843FE000
heap
page read and write
192FFB90000
trusted library allocation
page read and write
192893B8000
trusted library allocation
page read and write
19287B90000
trusted library allocation
page read and write
192FDA80000
heap
page read and write
19286C5A000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
192FDA28000
heap
page read and write
1928435A000
heap
page read and write
192FDA81000
heap
page read and write
192893D5000
trusted library allocation
page read and write
1928A34A000
trusted library allocation
page read and write
19283DBC000
trusted library allocation
page read and write
1928A906000
trusted library allocation
page read and write
19288993000
trusted library allocation
page read and write
1929335A000
heap
page read and write
1928F49A000
trusted library allocation
page read and write
19288630000
trusted library allocation
page read and write
39A97FE000
stack
page read and write
192FDA6B000
heap
page read and write
192FDA63000
heap
page read and write
19286BA0000
trusted library allocation
page read and write
192887C9000
trusted library allocation
page read and write
192FFCF0000
trusted library allocation
page read and write
1929079D000
trusted library allocation
page read and write
1DB9B9B9000
heap
page read and write
1928F379000
trusted library allocation
page read and write
17838710000
trusted library allocation
page read and write
19292A99000
trusted library allocation
page read and write
19293304000
heap
page read and write
1928435A000
heap
page read and write
192897B6000
trusted library allocation
page read and write
1928FCF2000
trusted library allocation
page read and write
19290A7B000
trusted library allocation
page read and write
1928F1E0000
trusted library allocation
page read and write
1928821F000
trusted library allocation
page read and write
19292DDA000
trusted library allocation
page read and write
19288770000
trusted library allocation
page read and write
27F09122000
heap
page read and write
1928F44C000
trusted library allocation
page read and write
19288BEB000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
19287BD0000
trusted library allocation
page read and write
192873C1000
trusted library allocation
page read and write
19292DE2000
trusted library allocation
page read and write
192FFDFA000
trusted library allocation
page read and write
22278045000
trusted library allocation
page read and write
17838560000
heap
page readonly
1928899B000
trusted library allocation
page read and write
19287319000
trusted library allocation
page read and write
19290A8C000
trusted library allocation
page read and write
192881FB000
trusted library allocation
page read and write
192907EA000
trusted library allocation
page read and write
1928F0A8000
trusted library allocation
page read and write
27F08386000
trusted library allocation
page read and write
19290A6E000
trusted library allocation
page read and write
192927FB000
trusted library allocation
page read and write
1929317A000
trusted library allocation
page read and write
1928F3CE000
trusted library allocation
page read and write
1929318B000
trusted library allocation
page read and write
27F08450000
trusted library section
page readonly
19292BC3000
trusted library allocation
page read and write
1928A8A3000
trusted library allocation
page read and write
19292DD8000
trusted library allocation
page read and write
19292D72000
trusted library allocation
page read and write
19288199000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
1928F21E000
trusted library allocation
page read and write
19292D80000
trusted library allocation
page read and write
192FDA65000
heap
page read and write
1928A480000
trusted library allocation
page read and write
D9C000
heap
page read and write
19288BEF000
trusted library allocation
page read and write
77754FE000
unkown
page readonly
1928874D000
trusted library allocation
page read and write
22277E20000
heap
page read and write
1929335B000
heap
page read and write
1929333A000
heap
page read and write
192FFC43000
trusted library allocation
page read and write
19286E9E000
trusted library allocation
page read and write
192FDA18000
heap
page read and write
192FDA76000
heap
page read and write
192887CC000
trusted library allocation
page read and write
192900F1000
trusted library allocation
page read and write
192FDACE000
heap
page read and write
1928898B000
trusted library allocation
page read and write
19292DA3000
trusted library allocation
page read and write
192884A6000
trusted library allocation
page read and write
192898E7000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
1928814B000
trusted library allocation
page read and write
192874CD000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
1928890C000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FDA22000
heap
page read and write
192FDA1E000
heap
page read and write
19283DBE000
trusted library allocation
page read and write
19292DA1000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192FDA6D000
heap
page read and write
19287B82000
trusted library allocation
page read and write
192FDA7D000
heap
page read and write
192FDA62000
heap
page read and write
192887E8000
trusted library allocation
page read and write
185B48A24000
trusted library allocation
page read and write
1928704A000
trusted library allocation
page read and write
1928EF9F000
trusted library allocation
page read and write
1928F1E9000
trusted library allocation
page read and write
1928704F000
trusted library allocation
page read and write
192FDA7E000
heap
page read and write
192FDA19000
heap
page read and write
192FDA81000
heap
page read and write
192FDA64000
heap
page read and write
1929000D000
trusted library allocation
page read and write
19288673000
trusted library allocation
page read and write
192886B6000
trusted library allocation
page read and write
192FDA83000
heap
page read and write
192882FA000
trusted library allocation
page read and write
27F090E6000
heap
page read and write
19286733000
trusted library allocation
page read and write
1928920A000
trusted library allocation
page read and write
178388F6000
heap
page read and write
19289290000
trusted library allocation
page read and write
192FFC8A000
trusted library allocation
page read and write
27F0915A000
heap
page read and write
192887E2000
trusted library allocation
page read and write
19292DFC000
trusted library allocation
page read and write
19288750000
trusted library allocation
page read and write
192843FE000
heap
page read and write
19290A50000
trusted library allocation
page read and write
19290050000
trusted library allocation
page read and write
1928697C000
trusted library allocation
page read and write
192900F1000
trusted library allocation
page read and write
192873BC000
trusted library allocation
page read and write
5F4000
heap
page read and write
192907DE000
trusted library allocation
page read and write
19283DC1000
trusted library allocation
page read and write
1928F0DC000
trusted library allocation
page read and write
1928416B000
trusted library allocation
page read and write
192FFF82000
trusted library allocation
page read and write
192FFC68000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
192FFCAD000
trusted library allocation
page read and write
1928A807000
trusted library allocation
page read and write
39AA07E000
unkown
page readonly
192843FE000
heap
page read and write
1928A843000
trusted library allocation
page read and write
192FDA80000
heap
page read and write
192FDA62000
heap
page read and write
22277D40000
heap
page read and write
1929094C000
trusted library allocation
page read and write
19284380000
heap
page read and write
192884AC000
trusted library allocation
page read and write
192867D9000
trusted library allocation
page read and write
19287BD9000
trusted library allocation
page read and write
1928729D000
trusted library allocation
page read and write
1928A4C4000
trusted library allocation
page read and write
1929334D000
heap
page read and write
1928F5BE000
trusted library allocation
page read and write
19286900000
trusted library allocation
page read and write
19292D50000
trusted library allocation
page read and write
19293361000
heap
page read and write
192FDA7C000
heap
page read and write
19284357000
heap
page read and write
19292D68000
trusted library allocation
page read and write
22277C90000
unclassified section
page readonly
192FDA64000
heap
page read and write
19292D99000
trusted library allocation
page read and write
192FDA6C000
heap
page read and write
27F08944000
heap
page read and write
1928F1E9000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19286978000
trusted library allocation
page read and write
1928932D000
trusted library allocation
page read and write
1928F34D000
trusted library allocation
page read and write
192873B4000
trusted library allocation
page read and write
19283DAA000
trusted library allocation
page read and write
1928FC1E000
trusted library allocation
page read and write
19283DF8000
trusted library allocation
page read and write
223A84F9000
heap
page read and write
19287E97000
trusted library allocation
page read and write
1929328C000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
2227811F000
unclassified section
page read and write
192887CF000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
19286CE2000
trusted library allocation
page read and write
192931DE000
trusted library allocation
page read and write
19292DDC000
trusted library allocation
page read and write
192843FE000
heap
page read and write
19288795000
trusted library allocation
page read and write
F891BCE000
unkown
page readonly
1928A495000
trusted library allocation
page read and write
1928EFCF000
trusted library allocation
page read and write
19292D96000
trusted library allocation
page read and write
1928F191000
trusted library allocation
page read and write
192887C9000
trusted library allocation
page read and write
19292BD3000
trusted library allocation
page read and write
1929330D000
heap
page read and write
192FDA16000
heap
page read and write
192881E6000
trusted library allocation
page read and write
1928EFAF000
trusted library allocation
page read and write
19290A43000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
19293301000
heap
page read and write
1928960B000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
27F08490000
trusted library allocation
page read and write
1928FCA8000
trusted library allocation
page read and write
27F083C3000
trusted library allocation
page read and write
1928FCB7000
trusted library allocation
page read and write
19284357000
heap
page read and write
192FFC86000
trusted library allocation
page read and write
19292BAC000
trusted library allocation
page read and write
192843A9000
heap
page read and write
192884E0000
trusted library allocation
page read and write
192872A6000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192FDA64000
heap
page read and write
192FDA85000
heap
page read and write
192FDA74000
heap
page read and write
1929335D000
heap
page read and write
D9B000
heap
page read and write
192932B6000
trusted library allocation
page read and write
19293330000
heap
page read and write
1928F3E7000
trusted library allocation
page read and write
192893CE000
trusted library allocation
page read and write
19290AD6000
trusted library allocation
page read and write
192884E0000
trusted library allocation
page read and write
192FDA0B000
heap
page read and write
192FDA18000
heap
page read and write
192FDA5A000
heap
page read and write
192884B9000
trusted library allocation
page read and write
1928F6F7000
trusted library allocation
page read and write
19292D9D000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
192FDA6B000
heap
page read and write
192FDA6B000
heap
page read and write
1928F2F2000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
1928FC0F000
trusted library allocation
page read and write
19290A7D000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
1928F41D000
trusted library allocation
page read and write
19292D4B000
trusted library allocation
page read and write
1928FC85000
trusted library allocation
page read and write
192881C8000
trusted library allocation
page read and write
192889AB000
trusted library allocation
page read and write
192FDA73000
heap
page read and write
192FDA5C000
heap
page read and write
19292D9D000
trusted library allocation
page read and write
192884F6000
trusted library allocation
page read and write
192843FE000
heap
page read and write
192FDA5C000
heap
page read and write
192FDA81000
heap
page read and write
192882F0000
trusted library allocation
page read and write
192FDA77000
heap
page read and write
27F07FE0000
unclassified section
page readonly
19292300000
trusted library allocation
page read and write
1928A478000
trusted library allocation
page read and write
1DB9B9A8000
heap
page read and write
192FFC68000
trusted library allocation
page read and write
192FDA84000
heap
page read and write
19283D9A000
trusted library allocation
page read and write
19284383000
heap
page read and write
1928A4B9000
trusted library allocation
page read and write
192931C4000
trusted library allocation
page read and write
1928F6C3000
trusted library allocation
page read and write
1928F247000
trusted library allocation
page read and write
192FFF7D000
trusted library allocation
page read and write
1DB99DC2000
heap
page read and write
19284357000
heap
page read and write
1928A7C8000
trusted library allocation
page read and write
178387CA000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
19292D71000
trusted library allocation
page read and write
1928A4E1000
trusted library allocation
page read and write
192FDA63000
heap
page read and write
192FDA6A000
heap
page read and write
19290AFE000
trusted library allocation
page read and write
1928691C000
trusted library allocation
page read and write
19286863000
trusted library allocation
page read and write
19284360000
heap
page read and write
192884E0000
trusted library allocation
page read and write
19292DA7000
trusted library allocation
page read and write
1928AC64000
trusted library allocation
page read and write
27F081E0000
heap
page read and write
19292DC5000
trusted library allocation
page read and write
F89467E000
stack
page read and write
19291193000
trusted library allocation
page read and write
19284380000
heap
page read and write
27F08A40000
unkown
page execute read
192932AF000
trusted library allocation
page read and write
192FFF17000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192880B8000
trusted library allocation
page read and write
192F6CEC000
trusted library allocation
page read and write
DA2000
heap
page read and write
1929323E000
trusted library allocation
page read and write
27F09060000
heap
page read and write
19293193000
trusted library allocation
page read and write
192873F2000
trusted library allocation
page read and write
19286CB8000
trusted library allocation
page read and write
19290A41000
trusted library allocation
page read and write
19291D80000
trusted library allocation
page read and write
192FDA6D000
heap
page read and write
19290ABB000
trusted library allocation
page read and write
19292D96000
trusted library allocation
page read and write
1929324C000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
777657E000
unkown
page readonly
19292100000
trusted library allocation
page read and write
19290934000
trusted library allocation
page read and write
1928F3E4000
trusted library allocation
page read and write
1929319D000
trusted library allocation
page read and write
192FDA7E000
heap
page read and write
19283DF6000
trusted library allocation
page read and write
1928EF79000
trusted library allocation
page read and write
192FDA78000
heap
page read and write
1928818E000
trusted library allocation
page read and write
192887E2000
trusted library allocation
page read and write
19289400000
trusted library allocation
page read and write
777543E000
stack
page read and write
19290A4B000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
27F090E8000
heap
page read and write
192900A0000
trusted library allocation
page read and write
1928873C000
trusted library allocation
page read and write
192873DA000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
19293304000
heap
page read and write
192874A8000
trusted library allocation
page read and write
192FFF13000
trusted library allocation
page read and write
19288175000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1928A488000
trusted library allocation
page read and write
5BA000
stack
page read and write
192881C8000
trusted library allocation
page read and write
19288743000
trusted library allocation
page read and write
19292D96000
trusted library allocation
page read and write
1928A4BE000
trusted library allocation
page read and write
192880C7000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
1928F31A000
trusted library allocation
page read and write
19292D6F000
trusted library allocation
page read and write
19292DBC000
trusted library allocation
page read and write
19287B9D000
trusted library allocation
page read and write
192909EB000
trusted library allocation
page read and write
1928863F000
trusted library allocation
page read and write
27F080DA000
heap
page read and write
19288BEF000
trusted library allocation
page read and write
192874D3000
trusted library allocation
page read and write
192FDA7D000
heap
page read and write
1928F0B1000
trusted library allocation
page read and write
1928FCEB000
trusted library allocation
page read and write
22278300000
trusted library allocation
page read and write
192FFB98000
trusted library allocation
page read and write
1DB99DB3000
heap
page read and write
1928F09B000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
1928890A000
trusted library allocation
page read and write
19293307000
heap
page read and write
192881F6000
trusted library allocation
page read and write
192869D8000
trusted library allocation
page read and write
DC3000
heap
page read and write
19288190000
trusted library allocation
page read and write
192927FB000
trusted library allocation
page read and write
19293361000
heap
page read and write
192FDA76000
heap
page read and write
27F08323000
trusted library allocation
page read and write
1928846E000
trusted library allocation
page read and write
192887CF000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
19283D97000
trusted library allocation
page read and write
19292DCA000
trusted library allocation
page read and write
1928F0E3000
trusted library allocation
page read and write
19290ACB000
trusted library allocation
page read and write
1928867E000
trusted library allocation
page read and write
1928698A000
trusted library allocation
page read and write
27F08F11000
trusted library allocation
page read and write
1928824B000
trusted library allocation
page read and write
192843FE000
heap
page read and write
27F0913C000
heap
page read and write
27F0908D000
heap
page read and write
1929312D000
trusted library allocation
page read and write
19288CD3000
trusted library allocation
page read and write
1928706F000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
1928F5C4000
trusted library allocation
page read and write
19288411000
trusted library allocation
page read and write
19288494000
trusted library allocation
page read and write
192FFDFA000
trusted library allocation
page read and write
5F4000
heap
page read and write
1928EFAF000
trusted library allocation
page read and write
192927C8000
trusted library allocation
page read and write
19286B75000
trusted library allocation
page read and write
19287061000
trusted library allocation
page read and write
17838764000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1928FC07000
trusted library allocation
page read and write
192FDA8F000
heap
page read and write
19284360000
heap
page read and write
19286C6D000
trusted library allocation
page read and write
19288234000
trusted library allocation
page read and write
19292D6F000
trusted library allocation
page read and write
19293134000
trusted library allocation
page read and write
19288656000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FDA8B000
heap
page read and write
19286CA7000
trusted library allocation
page read and write
17838723000
trusted library allocation
page read and write
19288BE4000
trusted library allocation
page read and write
192880A2000
trusted library allocation
page read and write
19288753000
trusted library allocation
page read and write
1928FC3E000
trusted library allocation
page read and write
19288783000
trusted library allocation
page read and write
27F090E0000
heap
page read and write
1928F499000
trusted library allocation
page read and write
192FDA61000
heap
page read and write
192927A3000
trusted library allocation
page read and write
1928A805000
trusted library allocation
page read and write
192873B4000
trusted library allocation
page read and write
1928FCEE000
trusted library allocation
page read and write
19289649000
trusted library allocation
page read and write
1928A1F0000
trusted library allocation
page read and write
19292C96000
trusted library allocation
page read and write
1928A1A0000
trusted library allocation
page read and write
19293362000
heap
page read and write
192FDA64000
heap
page read and write
19292D4B000
trusted library allocation
page read and write
1928F5DF000
trusted library allocation
page read and write
19286994000
trusted library allocation
page read and write
192874E5000
trusted library allocation
page read and write
19292DCA000
trusted library allocation
page read and write
22278003000
trusted library allocation
page read and write
1928895B000
trusted library allocation
page read and write
19288277000
trusted library allocation
page read and write
17838900000
trusted library allocation
page read and write
19292D8A000
trusted library allocation
page read and write
19288783000
trusted library allocation
page read and write
19292DBC000
trusted library allocation
page read and write
192887CD000
trusted library allocation
page read and write
27F0909C000
heap
page read and write
192FDA50000
heap
page read and write
192873B4000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192887C9000
trusted library allocation
page read and write
1928435A000
heap
page read and write
19286B40000
trusted library allocation
page read and write
1928F1B3000
trusted library allocation
page read and write
192FDA20000
heap
page read and write
192884E0000
trusted library allocation
page read and write
19283DC7000
trusted library allocation
page read and write
DC6000
heap
page read and write
19290AFA000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192869FD000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
192872B0000
trusted library allocation
page read and write
1928A117000
trusted library allocation
page read and write
1928F2A3000
trusted library allocation
page read and write
27F083E9000
trusted library allocation
page read and write
1928A4A7000
trusted library allocation
page read and write
19292D46000
trusted library allocation
page read and write
192911FC000
trusted library allocation
page read and write
19292D7A000
trusted library allocation
page read and write
19292DA1000
trusted library allocation
page read and write
1928A1E0000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
1928872F000
trusted library allocation
page read and write
5F4000
heap
page read and write
1DB9B9AA000
heap
page read and write
192FFB9E000
trusted library allocation
page read and write
192887ED000
trusted library allocation
page read and write
19287B5B000
trusted library allocation
page read and write
19287390000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192887F2000
trusted library allocation
page read and write
19292BD3000
trusted library allocation
page read and write
1928F5C4000
trusted library allocation
page read and write
19288271000
trusted library allocation
page read and write
B23DA003000
trusted library allocation
page read and write
1928F0F9000
trusted library allocation
page read and write
192FDA82000
heap
page read and write
19284357000
heap
page read and write
27F08A80000
heap
page read and write
192FDA9E000
heap
page read and write
192884E5000
trusted library allocation
page read and write
1783875D000
trusted library allocation
page read and write
19292C2D000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192881FB000
trusted library allocation
page read and write
3354000
heap
page read and write
192FDA26000
heap
page read and write
192FDA4E000
heap
page read and write
1928F422000
trusted library allocation
page read and write
192897AF000
trusted library allocation
page read and write
192881EC000
trusted library allocation
page read and write
1928822B000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
19290A45000
trusted library allocation
page read and write
192907F4000
trusted library allocation
page read and write
1928A841000
trusted library allocation
page read and write
27F08310000
trusted library allocation
page read and write
27F0836F000
trusted library allocation
page read and write
19292DBA000
trusted library allocation
page read and write
19288BDF000
trusted library allocation
page read and write
19286CC0000
trusted library allocation
page read and write
1928F2FD000
trusted library allocation
page read and write
192927F1000
trusted library allocation
page read and write
1928F3C0000
trusted library allocation
page read and write
1928F237000
trusted library allocation
page read and write
192FFFAD000
trusted library allocation
page read and write
19287367000
trusted library allocation
page read and write
1928EF75000
trusted library allocation
page read and write
192893E0000
trusted library allocation
page read and write
192882FA000
trusted library allocation
page read and write
1928437D000
heap
page read and write
19288478000
trusted library allocation
page read and write
1928EF69000
trusted library allocation
page read and write
19288418000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19288BFD000
trusted library allocation
page read and write
192FDA0B000
heap
page read and write
19286963000
trusted library allocation
page read and write
19286CF5000
trusted library allocation
page read and write
27F08378000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192884B5000
trusted library allocation
page read and write
222780F6000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
19292715000
trusted library allocation
page read and write
1929335D000
heap
page read and write
192FDA33000
heap
page read and write
192FDA9E000
heap
page read and write
192FDA62000
heap
page read and write
192FDA93000
heap
page read and write
192FDA71000
heap
page read and write
1928821F000
trusted library allocation
page read and write
19288282000
trusted library allocation
page read and write
192FDA76000
heap
page read and write
1929335A000
heap
page read and write
19290AF7000
trusted library allocation
page read and write
19292D88000
trusted library allocation
page read and write
D70000
heap
page read and write
192FDA77000
heap
page read and write
1DB9A0B0000
heap
page read and write
1928F07E000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
19286BA0000
trusted library allocation
page read and write
5F4000
heap
page read and write
192897E9000
trusted library allocation
page read and write
19289643000
trusted library allocation
page read and write
19292D44000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
192FFCE2000
trusted library allocation
page read and write
1928FCC5000
trusted library allocation
page read and write
192FDA75000
heap
page read and write
19292DC5000
trusted library allocation
page read and write
192FDA8A000
heap
page read and write
19290A51000
trusted library allocation
page read and write
19286CF5000
trusted library allocation
page read and write
1928A331000
trusted library allocation
page read and write
192FDA20000
heap
page read and write
1928FC32000
trusted library allocation
page read and write
192FDA6E000
heap
page read and write
19286EB2000
trusted library allocation
page read and write
19292D80000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FFFD6000
trusted library allocation
page read and write
27F090F1000
heap
page read and write
192FDA74000
heap
page read and write
19292BE5000
trusted library allocation
page read and write
1928A15B000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
19290A43000
trusted library allocation
page read and write
19288667000
trusted library allocation
page read and write
1928738C000
trusted library allocation
page read and write
1928EF75000
trusted library allocation
page read and write
19288A82000
trusted library allocation
page read and write
19286763000
trusted library allocation
page read and write
39AA03D000
stack
page read and write
192FDA8B000
heap
page read and write
192883F8000
trusted library allocation
page read and write
1928F325000
trusted library allocation
page read and write
19286C9C000
trusted library allocation
page read and write
27F0905C000
heap
page read and write
1929315A000
trusted library allocation
page read and write
192843FE000
heap
page read and write
1929335B000
heap
page read and write
192893D7000
trusted library allocation
page read and write
192FFC54000
trusted library allocation
page read and write
1928704B000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
19289333000
trusted library allocation
page read and write
192FDA86000
heap
page read and write
27F09178000
heap
page read and write
19290A41000
trusted library allocation
page read and write
19288BFD000
trusted library allocation
page read and write
19288BE0000
trusted library allocation
page read and write
19289641000
trusted library allocation
page read and write
1929314D000
trusted library allocation
page read and write
19292DE6000
trusted library allocation
page read and write
192FDA63000
heap
page read and write
19292DF2000
trusted library allocation
page read and write
192FDA57000
heap
page read and write
27F0907F000
heap
page read and write
1928735B000
trusted library allocation
page read and write
192FFC55000
trusted library allocation
page read and write
17838D40000
heap
page read and write
19284380000
heap
page read and write
192FDA75000
heap
page read and write
1928931F000
trusted library allocation
page read and write
19292D6F000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
1928F2FC000
trusted library allocation
page read and write
19288973000
trusted library allocation
page read and write
19292B69000
trusted library allocation
page read and write
19292C90000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
19286C62000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928A933000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
1928F24A000
trusted library allocation
page read and write
19287041000
trusted library allocation
page read and write
192927D0000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192FDAAE000
heap
page read and write
192909E6000
trusted library allocation
page read and write
17838580000
heap
page read and write
192867E1000
trusted library allocation
page read and write
1929315A000
trusted library allocation
page read and write
440000
unkown
page readonly
27F090E6000
heap
page read and write
1928698E000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
19289322000
trusted library allocation
page read and write
192881E3000
trusted library allocation
page read and write
1928A92E000
trusted library allocation
page read and write
1929315C000
trusted library allocation
page read and write
19290A6E000
trusted library allocation
page read and write
1928698E000
trusted library allocation
page read and write
19288743000
trusted library allocation
page read and write
1928AC23000
trusted library allocation
page read and write
192874E2000
trusted library allocation
page read and write
192FDAA1000
heap
page read and write
1928A3DD000
trusted library allocation
page read and write
19287083000
trusted library allocation
page read and write
192FDA0B000
heap
page read and write
19290AB6000
trusted library allocation
page read and write
192881F6000
trusted library allocation
page read and write
1928F1CD000
trusted library allocation
page read and write
19290A67000
trusted library allocation
page read and write
192884A2000
trusted library allocation
page read and write
19286771000
trusted library allocation
page read and write
39AC27E000
unkown
page readonly
27F09060000
heap
page read and write
192FDA19000
heap
page read and write
192FDACE000
heap
page read and write
1928F135000
trusted library allocation
page read and write
192931A6000
trusted library allocation
page read and write
19292BE1000
trusted library allocation
page read and write
19288A52000
trusted library allocation
page read and write
19283D9D000
trusted library allocation
page read and write
1928FCC3000
trusted library allocation
page read and write
17838380000
remote allocation
page execute read
19292DCA000
trusted library allocation
page read and write
27F08AE0000
heap
page read and write
19293361000
heap
page read and write
1928A4C0000
trusted library allocation
page read and write
19292B69000
trusted library allocation
page read and write
1928F5E3000
trusted library allocation
page read and write
502000
unkown
page readonly
192873B0000
trusted library allocation
page read and write
19288797000
trusted library allocation
page read and write
192887ED000
trusted library allocation
page read and write
1928F5BE000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
19292DCC000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19292D83000
trusted library allocation
page read and write
1928F016000
trusted library allocation
page read and write
19290ACE000
trusted library allocation
page read and write
19288498000
trusted library allocation
page read and write
19289382000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
192FDA93000
heap
page read and write
1928F5E3000
trusted library allocation
page read and write
192FDAAE000
heap
page read and write
19287BE9000
trusted library allocation
page read and write
1928EF75000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FDA85000
heap
page read and write
192FDA6A000
heap
page read and write
1928879C000
trusted library allocation
page read and write
1929076F000
trusted library allocation
page read and write
19293308000
heap
page read and write
19288943000
trusted library allocation
page read and write
192884C3000
trusted library allocation
page read and write
192873D1000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
1928A4C4000
trusted library allocation
page read and write
19286BD6000
trusted library allocation
page read and write
1928863F000
trusted library allocation
page read and write
192FDA18000
heap
page read and write
1928FC32000
trusted library allocation
page read and write
192FDA86000
heap
page read and write
192927FB000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192FDA38000
heap
page read and write
192FDA77000
heap
page read and write
192FDA5C000
heap
page read and write
1928435A000
heap
page read and write
1928F6B3000
trusted library allocation
page read and write
1928F220000
trusted library allocation
page read and write
DBD000
heap
page read and write
192896E6000
trusted library allocation
page read and write
5F4000
heap
page read and write
1928F3D7000
trusted library allocation
page read and write
19284372000
heap
page read and write
192931AD000
trusted library allocation
page read and write
19289357000
trusted library allocation
page read and write
192887E8000
trusted library allocation
page read and write
192FFF75000
trusted library allocation
page read and write
192887C7000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928F2BC000
trusted library allocation
page read and write
19290AA1000
trusted library allocation
page read and write
19291F02000
trusted library allocation
page read and write
19286C59000
trusted library allocation
page read and write
192927DC000
trusted library allocation
page read and write
192889AB000
trusted library allocation
page read and write
1928F298000
trusted library allocation
page read and write
192FDA0B000
heap
page read and write
192FDAC5000
heap
page read and write
1928F5BE000
trusted library allocation
page read and write
19292DCA000
trusted library allocation
page read and write
19286984000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
19292D6F000
trusted library allocation
page read and write
192927C4000
trusted library allocation
page read and write
1928706F000
trusted library allocation
page read and write
27F08440000
unclassified section
page read and write
192FFC6D000
trusted library allocation
page read and write
1929319B000
trusted library allocation
page read and write
1928F1FC000
trusted library allocation
page read and write
22278120000
heap
page read and write
1928F41B000
trusted library allocation
page read and write
19292BE1000
trusted library allocation
page read and write
1928F09B000
trusted library allocation
page read and write
1928927F000
trusted library allocation
page read and write
19284360000
heap
page read and write
1928932B000
trusted library allocation
page read and write
192881F6000
trusted library allocation
page read and write
19283D79000
trusted library allocation
page read and write
19288430000
trusted library allocation
page read and write
19290A89000
trusted library allocation
page read and write
19293134000
trusted library allocation
page read and write
1928A901000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
19288BAA000
trusted library allocation
page read and write
27F0916A000
heap
page read and write
1928F425000
trusted library allocation
page read and write
185B48A1E000
trusted library allocation
page read and write
19287363000
trusted library allocation
page read and write
19286CF5000
trusted library allocation
page read and write
19290AA8000
trusted library allocation
page read and write
192FDA76000
heap
page read and write
192FDA15000
heap
page read and write
27F0907D000
heap
page read and write
192FDA3A000
heap
page read and write
1929315A000
trusted library allocation
page read and write
192887ED000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
19284134000
trusted library allocation
page read and write
1928A80C000
trusted library allocation
page read and write
192FDA1E000
heap
page read and write
19288A38000
trusted library allocation
page read and write
22277E23000
heap
page read and write
1928A843000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
1928F121000
trusted library allocation
page read and write
1928875F000
trusted library allocation
page read and write
5F4000
heap
page read and write
19290A49000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
192FDA81000
heap
page read and write
1928820E000
trusted library allocation
page read and write
36A1000
heap
page read and write
1928F349000
trusted library allocation
page read and write
192909F5000
trusted library allocation
page read and write
19286CE2000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192893B1000
trusted library allocation
page read and write
19286C3D000
trusted library allocation
page read and write
1928F1F2000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
192884C3000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192898FC000
trusted library allocation
page read and write
1928F2FC000
trusted library allocation
page read and write
192841D1000
trusted library allocation
page read and write
27F09000000
heap
page read and write
19287344000
trusted library allocation
page read and write
19292D9E000
trusted library allocation
page read and write
19293361000
heap
page read and write
1928F0A1000
trusted library allocation
page read and write
192886FA000
trusted library allocation
page read and write
192931B0000
trusted library allocation
page read and write
19292DBC000
trusted library allocation
page read and write
19290A9F000
trusted library allocation
page read and write
19288EEF000
trusted library allocation
page read and write
192887E8000
trusted library allocation
page read and write
19287BDD000
trusted library allocation
page read and write
19292DE6000
trusted library allocation
page read and write
192884C3000
trusted library allocation
page read and write
19288639000
trusted library allocation
page read and write
19286779000
trusted library allocation
page read and write
1928F1C7000
trusted library allocation
page read and write
19286EA5000
trusted library allocation
page read and write
192927BA000
trusted library allocation
page read and write
27F0916A000
heap
page read and write
1928F3DF000
trusted library allocation
page read and write
1928F247000
trusted library allocation
page read and write
19286971000
trusted library allocation
page read and write
19284133000
trusted library allocation
page read and write
1928F2F2000
trusted library allocation
page read and write
17838932000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
192FDA38000
heap
page read and write
1928F0BF000
trusted library allocation
page read and write
192FDA4F000
heap
page read and write
19290A67000
trusted library allocation
page read and write
19287309000
trusted library allocation
page read and write
19292BEA000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
19290A49000
trusted library allocation
page read and write
1928F0AE000
trusted library allocation
page read and write
19289641000
trusted library allocation
page read and write
19290A50000
trusted library allocation
page read and write
1928F377000
trusted library allocation
page read and write
19287484000
trusted library allocation
page read and write
19289396000
trusted library allocation
page read and write
19288248000
trusted library allocation
page read and write
19292D83000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
1928F1FD000
trusted library allocation
page read and write
F895E7E000
unkown
page readonly
192FDA81000
heap
page read and write
19292D68000
trusted library allocation
page read and write
1928935F000
trusted library allocation
page read and write
1929334C000
heap
page read and write
192FDA6B000
heap
page read and write
192931A1000
trusted library allocation
page read and write
192873B2000
trusted library allocation
page read and write
192FDA7E000
heap
page read and write
192FDA80000
heap
page read and write
192FDA62000
heap
page read and write
19290A89000
trusted library allocation
page read and write
19286CF5000
trusted library allocation
page read and write
1928F6DF000
trusted library allocation
page read and write
19286CD0000
trusted library allocation
page read and write
192932AA000
trusted library allocation
page read and write
192FDA6E000
heap
page read and write
192FFBC0000
trusted library allocation
page read and write
1928414B000
trusted library allocation
page read and write
192841FA000
trusted library allocation
page read and write
19284382000
heap
page read and write
1928A371000
trusted library allocation
page read and write
192872E2000
trusted library allocation
page read and write
19292B3C000
trusted library allocation
page read and write
192898E7000
trusted library allocation
page read and write
192F6CFE000
trusted library allocation
page read and write
192FDA9E000
heap
page read and write
1928749B000
trusted library allocation
page read and write
192884B3000
trusted library allocation
page read and write
1928F5AA000
trusted library allocation
page read and write
19288475000
trusted library allocation
page read and write
192FDA57000
heap
page read and write
192FDA85000
heap
page read and write
27F08920000
heap
page read and write
192FDA0E000
heap
page read and write
27F08F06000
trusted library allocation
page read and write
1928F0A9000
trusted library allocation
page read and write
19288652000
trusted library allocation
page read and write
22277DC0000
heap
page read and write
19290AC6000
trusted library allocation
page read and write
F891B4E000
unkown
page readonly
19290AEF000
trusted library allocation
page read and write
1929329D000
trusted library allocation
page read and write
192881E6000
trusted library allocation
page read and write
39AA0FB000
stack
page read and write
192911EF000
trusted library allocation
page read and write
27F090A8000
heap
page read and write
192898B9000
trusted library allocation
page read and write
19286CE6000
trusted library allocation
page read and write
1928EF6D000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
19289389000
trusted library allocation
page read and write
19290058000
trusted library allocation
page read and write
1929312D000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
192867FD000
trusted library allocation
page read and write
192932AA000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928A1A8000
trusted library allocation
page read and write
F580A81000
trusted library allocation
page execute read
27F08376000
trusted library allocation
page read and write
19283DA6000
trusted library allocation
page read and write
19292B9F000
trusted library allocation
page read and write
192FDA86000
heap
page read and write
19286B75000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
192FFC68000
trusted library allocation
page read and write
19288478000
trusted library allocation
page read and write
19289319000
trusted library allocation
page read and write
19288773000
trusted library allocation
page read and write
19284380000
heap
page read and write
192867D6000
trusted library allocation
page read and write
19293138000
trusted library allocation
page read and write
1929335D000
heap
page read and write
192FDA0F000
heap
page read and write
1928F24A000
trusted library allocation
page read and write
1928FCBB000
trusted library allocation
page read and write
19286B69000
trusted library allocation
page read and write
19286C5A000
trusted library allocation
page read and write
19283CB0000
trusted library allocation
page read and write
192873DA000
trusted library allocation
page read and write
27F0916A000
heap
page read and write
1928A787000
trusted library allocation
page read and write
19292DA7000
trusted library allocation
page read and write
1783890D000
trusted library allocation
page read and write
19288933000
trusted library allocation
page read and write
19287B5D000
trusted library allocation
page read and write
1928FC0F000
trusted library allocation
page read and write
192FFC2A000
trusted library allocation
page read and write
192887ED000
trusted library allocation
page read and write
19288199000
trusted library allocation
page read and write
19283DA6000
trusted library allocation
page read and write
27F090EB000
heap
page read and write
1928438C000
heap
page read and write
27F08050000
remote allocation
page execute read
19290AAB000
trusted library allocation
page read and write
192873A4000
trusted library allocation
page read and write
19288AA0000
trusted library allocation
page read and write
19289355000
trusted library allocation
page read and write
192FDA57000
heap
page read and write
19288087000
trusted library allocation
page read and write
1929079D000
trusted library allocation
page read and write
1928A190000
trusted library allocation
page read and write
192FDA80000
heap
page read and write
19286849000
trusted library allocation
page read and write
F89567E000
stack
page read and write
192893C1000
trusted library allocation
page read and write
192884F6000
trusted library allocation
page read and write
192FFF93000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
1928EF69000
trusted library allocation
page read and write
19286C5C000
trusted library allocation
page read and write
1928F3D7000
trusted library allocation
page read and write
192FDA86000
heap
page read and write
192FDA38000
heap
page read and write
192933DD000
heap
page read and write
192880FA000
trusted library allocation
page read and write
19290058000
trusted library allocation
page read and write
15AE000
stack
page read and write
C2885FF000
stack
page read and write
DA4000
heap
page read and write
192FDA4E000
heap
page read and write
192FFB98000
trusted library allocation
page read and write
1928A8E4000
trusted library allocation
page read and write
192880F4000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
19286CF5000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192FDA81000
heap
page read and write
19290AC6000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
1928849D000
trusted library allocation
page read and write
192887ED000
trusted library allocation
page read and write
7773BD8000
stack
page read and write
192FDA63000
heap
page read and write
192FDA8C000
heap
page read and write
19293307000
heap
page read and write
1928A4EA000
trusted library allocation
page read and write
1928FCC1000
trusted library allocation
page read and write
192843FE000
heap
page read and write
19286CFA000
trusted library allocation
page read and write
1928F665000
trusted library allocation
page read and write
1928F074000
trusted library allocation
page read and write
19286BA0000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FDA8F000
heap
page read and write
192887BD000
trusted library allocation
page read and write
1928A886000
trusted library allocation
page read and write
19286CD9000
trusted library allocation
page read and write
19286869000
trusted library allocation
page read and write
192FDA1B000
heap
page read and write
19290AEF000
trusted library allocation
page read and write
19288992000
trusted library allocation
page read and write
1928924E000
trusted library allocation
page read and write
19287037000
trusted library allocation
page read and write
178383A0000
unclassified section
page readonly
19288475000
trusted library allocation
page read and write
192881E6000
trusted library allocation
page read and write
19286CA4000
trusted library allocation
page read and write
19286B60000
trusted library allocation
page read and write
192881E6000
trusted library allocation
page read and write
19287BC5000
trusted library allocation
page read and write
19293132000
trusted library allocation
page read and write
1928EFDA000
trusted library allocation
page read and write
192909EE000
trusted library allocation
page read and write
17838570000
unclassified section
page read and write
192886C5000
trusted library allocation
page read and write
192884EB000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1928A348000
trusted library allocation
page read and write
19289644000
trusted library allocation
page read and write
19292A96000
trusted library allocation
page read and write
DBE000
heap
page read and write
192927BA000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192FDA75000
heap
page read and write
192898F6000
trusted library allocation
page read and write
19284380000
heap
page read and write
19288175000
trusted library allocation
page read and write
19288186000
trusted library allocation
page read and write
1928F237000
trusted library allocation
page read and write
192882C2000
trusted library allocation
page read and write
27F08A30000
trusted library allocation
page read and write
192FFB9F000
trusted library allocation
page read and write
19286C5C000
trusted library allocation
page read and write
192881E1000
trusted library allocation
page read and write
19290A97000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
1928F1D7000
trusted library allocation
page read and write
1928F23F000
trusted library allocation
page read and write
1928F480000
trusted library allocation
page read and write
19288A0B000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
192FDA5C000
heap
page read and write
192FDA5C000
heap
page read and write
192FDA1E000
heap
page read and write
192FDA2E000
heap
page read and write
192893B6000
trusted library allocation
page read and write
192FDA70000
heap
page read and write
19286B7A000
trusted library allocation
page read and write
1928AC27000
trusted library allocation
page read and write
192FDA1A000
heap
page read and write
1928F1E2000
trusted library allocation
page read and write
19286763000
trusted library allocation
page read and write
27F090FC000
heap
page read and write
D94000
heap
page read and write
22277D6A000
heap
page read and write
27F080A0000
heap
page read and write
19284163000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192FDA85000
heap
page read and write
192909EE000
trusted library allocation
page read and write
22278240000
unclassified section
page readonly
17838400000
heap
page read and write
192893B3000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
19288498000
trusted library allocation
page read and write
1928EF4C000
trusted library allocation
page read and write
19286CAA000
trusted library allocation
page read and write
1929315E000
trusted library allocation
page read and write
192FDA70000
heap
page read and write
1928F1CA000
trusted library allocation
page read and write
19288759000
trusted library allocation
page read and write
192882BA000
trusted library allocation
page read and write
192883CB000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
19288385000
trusted library allocation
page read and write
192893B8000
trusted library allocation
page read and write
1928935D000
trusted library allocation
page read and write
19292DCC000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
192882F0000
trusted library allocation
page read and write
1DB99DAE000
heap
page read and write
192FDA73000
heap
page read and write
19286824000
trusted library allocation
page read and write
192873FA000
trusted library allocation
page read and write
F893DFE000
unkown
page readonly
1928A7F1000
trusted library allocation
page read and write
19290ACB000
trusted library allocation
page read and write
19291198000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192927FB000
trusted library allocation
page read and write
19283D5D000
trusted library allocation
page read and write
1928EF7D000
trusted library allocation
page read and write
1928963F000
trusted library allocation
page read and write
19289259000
trusted library allocation
page read and write
192893B6000
trusted library allocation
page read and write
1928935B000
trusted library allocation
page read and write
1928937B000
trusted library allocation
page read and write
19288C00000
trusted library allocation
page read and write
192FFC3B000
trusted library allocation
page read and write
192880AA000
trusted library allocation
page read and write
22277D60000
heap
page read and write
1929334D000
heap
page read and write
192FDA22000
heap
page read and write
22278013000
trusted library allocation
page read and write
1928878B000
trusted library allocation
page read and write
1928962F000
trusted library allocation
page read and write
192FDA8C000
heap
page read and write
1928F0AE000
trusted library allocation
page read and write
192873B7000
trusted library allocation
page read and write
1928734F000
trusted library allocation
page read and write
1928419F000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192FDA78000
heap
page read and write
19291FA8000
trusted library allocation
page read and write
19283DA8000
trusted library allocation
page read and write
DA4000
heap
page read and write
19286EE0000
trusted library allocation
page read and write
1928EFB4000
trusted library allocation
page read and write
19284383000
heap
page read and write
1DB9B9BD000
heap
page read and write
19293138000
trusted library allocation
page read and write
192873A7000
trusted library allocation
page read and write
19286994000
trusted library allocation
page read and write
19288682000
trusted library allocation
page read and write
19287448000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192887E2000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192FDA63000
heap
page read and write
19286B80000
trusted library allocation
page read and write
192FDA38000
heap
page read and write
192887AC000
trusted library allocation
page read and write
19286EDD000
trusted library allocation
page read and write
1928A841000
trusted library allocation
page read and write
192FFF1E000
trusted library allocation
page read and write
19289361000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
DC3000
heap
page read and write
19292D7A000
trusted library allocation
page read and write
19290A7D000
trusted library allocation
page read and write
1929334D000
heap
page read and write
1928A4BC000
trusted library allocation
page read and write
192874C4000
trusted library allocation
page read and write
F8935FE000
stack
page read and write
192FFCDF000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
19292C8C000
trusted library allocation
page read and write
1928F1D7000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
19284383000
heap
page read and write
192FDA3A000
heap
page read and write
192873B9000
trusted library allocation
page read and write
192FDA57000
heap
page read and write
27F08348000
trusted library allocation
page read and write
192880E8000
trusted library allocation
page read and write
19288421000
trusted library allocation
page read and write
19292AF8000
trusted library allocation
page read and write
1929332D000
heap
page read and write
1928435A000
heap
page read and write
D9A000
heap
page read and write
19292D91000
trusted library allocation
page read and write
192867B9000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
1928A470000
trusted library allocation
page read and write
19287398000
trusted library allocation
page read and write
1928A92C000
trusted library allocation
page read and write
1928FC12000
trusted library allocation
page read and write
1928F2F2000
trusted library allocation
page read and write
1928689A000
trusted library allocation
page read and write
192886AB000
trusted library allocation
page read and write
1928ACAC000
trusted library allocation
page read and write
192884A6000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
27F090FC000
heap
page read and write
192FFE71000
trusted library allocation
page read and write
5F4000
heap
page read and write
1929335D000
heap
page read and write
1928A933000
trusted library allocation
page read and write
1783891D000
trusted library allocation
page read and write
1928A45C000
trusted library allocation
page read and write
19292B9F000
trusted library allocation
page read and write
1928F5CA000
trusted library allocation
page read and write
1928734F000
trusted library allocation
page read and write
192FDA75000
heap
page read and write
192884B3000
trusted library allocation
page read and write
1783857F000
unclassified section
page read and write
27F090EB000
heap
page read and write
192FDA6C000
heap
page read and write
19292D99000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
1928866A000
trusted library allocation
page read and write
19292C2F000
trusted library allocation
page read and write
19284382000
heap
page read and write
19289328000
trusted library allocation
page read and write
1DB9A10A000
trusted library allocation
page read and write
19292C23000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
192887E8000
trusted library allocation
page read and write
192FFBC7000
trusted library allocation
page read and write
1928F6CD000
trusted library allocation
page read and write
19290A67000
trusted library allocation
page read and write
1928F38F000
trusted library allocation
page read and write
19286B87000
trusted library allocation
page read and write
19286CD9000
trusted library allocation
page read and write
192FFC32000
trusted library allocation
page read and write
192FDA0A000
heap
page read and write
19290A0B000
trusted library allocation
page read and write
1928FCC1000
trusted library allocation
page read and write
192887EC000
trusted library allocation
page read and write
1928EF71000
trusted library allocation
page read and write
19286B81000
trusted library allocation
page read and write
1929330B000
heap
page read and write
1928FCBF000
trusted library allocation
page read and write
1929279C000
trusted library allocation
page read and write
1928876E000
trusted library allocation
page read and write
19290AB5000
trusted library allocation
page read and write
19286CA7000
trusted library allocation
page read and write
192FDA8B000
heap
page read and write
F894E7E000
unkown
page readonly
192843FE000
heap
page read and write
192873B1000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
1928A476000
trusted library allocation
page read and write
19290ACC000
trusted library allocation
page read and write
192873B9000
trusted library allocation
page read and write
1929335D000
heap
page read and write
192FDA51000
heap
page read and write
1928808E000
trusted library allocation
page read and write
19283CA6000
trusted library allocation
page read and write
19290054000
trusted library allocation
page read and write
19288943000
trusted library allocation
page read and write
19286CFA000
trusted library allocation
page read and write
192FDA18000
heap
page read and write
192882C1000
trusted library allocation
page read and write
19290A3E000
trusted library allocation
page read and write
19290A63000
trusted library allocation
page read and write
1928F110000
trusted library allocation
page read and write
1928866A000
trusted library allocation
page read and write
1928696D000
trusted library allocation
page read and write
192FDA54000
heap
page read and write
1929333A000
heap
page read and write
19292DE9000
trusted library allocation
page read and write
19286978000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
19288494000
trusted library allocation
page read and write
192FFC86000
trusted library allocation
page read and write
1928F06D000
trusted library allocation
page read and write
1928812A000
trusted library allocation
page read and write
19283DC1000
trusted library allocation
page read and write
192FFC72000
trusted library allocation
page read and write
19292AE9000
trusted library allocation
page read and write
1928A957000
trusted library allocation
page read and write
1928A3C6000
trusted library allocation
page read and write
1928F382000
trusted library allocation
page read and write
19287BB4000
trusted library allocation
page read and write
1928A110000
trusted library allocation
page read and write
BBE000
stack
page read and write
27F090F2000
heap
page read and write
192FDA93000
heap
page read and write
19292DD1000
trusted library allocation
page read and write
1928690A000
trusted library allocation
page read and write
27F09069000
heap
page read and write
192FDA72000
heap
page read and write
19288121000
trusted library allocation
page read and write
1928F1DC000
trusted library allocation
page read and write
222780F1000
trusted library allocation
page read and write
192FDA7B000
heap
page read and write
192884E0000
trusted library allocation
page read and write
27F09060000
heap
page read and write
27F090E3000
heap
page read and write
19287093000
trusted library allocation
page read and write
1928F49A000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
192FDA2E000
heap
page read and write
1929311B000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
19289648000
trusted library allocation
page read and write
192893BF000
trusted library allocation
page read and write
19286B5C000
trusted library allocation
page read and write
1928672F000
trusted library allocation
page read and write
19289659000
trusted library allocation
page read and write
192FFC0D000
trusted library allocation
page read and write
192932AF000
trusted library allocation
page read and write
19293284000
trusted library allocation
page read and write
192933B6000
heap
page read and write
192886B2000
trusted library allocation
page read and write
192893BD000
trusted library allocation
page read and write
192FDA77000
heap
page read and write
1928867E000
trusted library allocation
page read and write
192869D8000
trusted library allocation
page read and write
19288783000
trusted library allocation
page read and write
1928F1EF000
trusted library allocation
page read and write
1928874C000
trusted library allocation
page read and write
1928691F000
trusted library allocation
page read and write
19AE000
stack
page read and write
1928A46D000
trusted library allocation
page read and write
19292DCA000
trusted library allocation
page read and write
192FDA8B000
heap
page read and write
1928F0D6000
trusted library allocation
page read and write
1928F3D4000
trusted library allocation
page read and write
192FFC6D000
trusted library allocation
page read and write
19292DA7000
trusted library allocation
page read and write
1929318F000
trusted library allocation
page read and write
192870D4000
trusted library allocation
page read and write
192FDA7E000
heap
page read and write
192FDA70000
heap
page read and write
19286B8E000
trusted library allocation
page read and write
1928736B000
trusted library allocation
page read and write
19289400000
trusted library allocation
page read and write
192843B8000
heap
page read and write
192FFDD6000
trusted library allocation
page read and write
1928822D000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1928F0BF000
trusted library allocation
page read and write
192927B2000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
1928A4C2000
trusted library allocation
page read and write
192FDA7C000
heap
page read and write
1929077D000
trusted library allocation
page read and write
1928F374000
trusted library allocation
page read and write
192FDA8C000
heap
page read and write
1928F0E1000
trusted library allocation
page read and write
192887F2000
trusted library allocation
page read and write
19289359000
trusted library allocation
page read and write
1928F2FE000
trusted library allocation
page read and write
1928F37D000
trusted library allocation
page read and write
27F0916A000
heap
page read and write
1928F13C000
trusted library allocation
page read and write
1928849D000
trusted library allocation
page read and write
192911D4000
trusted library allocation
page read and write
192873DE000
trusted library allocation
page read and write
19284380000
heap
page read and write
19292DFB000
trusted library allocation
page read and write
19288C85000
trusted library allocation
page read and write
19293181000
trusted library allocation
page read and write
192FFFE2000
trusted library allocation
page read and write
19283DDC000
trusted library allocation
page read and write
19288494000
trusted library allocation
page read and write
19286E19000
trusted library allocation
page read and write
19288635000
trusted library allocation
page read and write
192933E0000
heap
page read and write
22278078000
trusted library allocation
page read and write
1929314D000
trusted library allocation
page read and write
1928437D000
heap
page read and write
1928EF71000
trusted library allocation
page read and write
1929007A000
trusted library allocation
page read and write
27F083C6000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192893AF000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192932AF000
trusted library allocation
page read and write
19284380000
heap
page read and write
192F6CE4000
trusted library allocation
page read and write
178387B9000
trusted library allocation
page read and write
19283DF6000
trusted library allocation
page read and write
223A8707000
trusted library allocation
page read and write
19286CCF000
trusted library allocation
page read and write
19283DFE000
trusted library allocation
page read and write
19286761000
trusted library allocation
page read and write
19290A45000
trusted library allocation
page read and write
19283D56000
trusted library allocation
page read and write
192FDA8A000
heap
page read and write
19292B4E000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
19288745000
trusted library allocation
page read and write
19288BDC000
trusted library allocation
page read and write
19286BD6000
trusted library allocation
page read and write
1DB99DC4000
heap
page read and write
192FDA2C000
heap
page read and write
19286BA0000
trusted library allocation
page read and write
19288783000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192FDA81000
heap
page read and write
39AB17E000
unkown
page readonly
19286BA0000
trusted library allocation
page read and write
1929005A000
trusted library allocation
page read and write
1928873A000
trusted library allocation
page read and write
192FDA18000
heap
page read and write
192FDA81000
heap
page read and write
19288766000
trusted library allocation
page read and write
27F08080000
heap
page read and write
1928F1D8000
trusted library allocation
page read and write
1928F5CA000
trusted library allocation
page read and write
192932AD000
trusted library allocation
page read and write
1928F03C000
trusted library allocation
page read and write
192887AC000
trusted library allocation
page read and write
1928EF79000
trusted library allocation
page read and write
192873AC000
trusted library allocation
page read and write
19286984000
trusted library allocation
page read and write
192FDA83000
heap
page read and write
192FDA85000
heap
page read and write
19288775000
trusted library allocation
page read and write
192873B9000
trusted library allocation
page read and write
192886EF000
trusted library allocation
page read and write
19287B8C000
trusted library allocation
page read and write
192909D6000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
1928F355000
trusted library allocation
page read and write
27F09123000
heap
page read and write
1928A4BE000
trusted library allocation
page read and write
192FDA79000
heap
page read and write
19292DD1000
trusted library allocation
page read and write
19288A62000
trusted library allocation
page read and write
19288475000
trusted library allocation
page read and write
192911F9000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192FDA6B000
heap
page read and write
1928A4F9000
trusted library allocation
page read and write
192FDA8F000
heap
page read and write
1928F1F4000
trusted library allocation
page read and write
192882F0000
trusted library allocation
page read and write
19288182000
trusted library allocation
page read and write
192FDA38000
heap
page read and write
19292C59000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
19287067000
trusted library allocation
page read and write
1928F1EF000
trusted library allocation
page read and write
C2875FE000
stack
page read and write
1928F127000
trusted library allocation
page read and write
1928AC81000
trusted library allocation
page read and write
19292B4E000
trusted library allocation
page read and write
192FDA77000
heap
page read and write
192FDA85000
heap
page read and write
192907D9000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19286BD6000
trusted library allocation
page read and write
19293307000
heap
page read and write
192FFBF9000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
192FDA78000
heap
page read and write
19290A5B000
trusted library allocation
page read and write
1928FCEB000
trusted library allocation
page read and write
1928F0D6000
trusted library allocation
page read and write
1928F1F4000
trusted library allocation
page read and write
1929329D000
trusted library allocation
page read and write
19286C91000
trusted library allocation
page read and write
1928F2A3000
trusted library allocation
page read and write
1928F286000
trusted library allocation
page read and write
27F090E1000
heap
page read and write
192FDA74000
heap
page read and write
192911F5000
trusted library allocation
page read and write
1928A84D000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
192841CA000
trusted library allocation
page read and write
1928F0AE000
trusted library allocation
page read and write
1928A8C5000
trusted library allocation
page read and write
1928F2D3000
trusted library allocation
page read and write
1DB9A050000
heap
page read and write
178383E0000
heap
page read and write
19286C91000
trusted library allocation
page read and write
27F090E0000
heap
page read and write
1928F32B000
trusted library allocation
page read and write
192897B9000
trusted library allocation
page read and write
19287089000
trusted library allocation
page read and write
192873A9000
trusted library allocation
page read and write
19289247000
trusted library allocation
page read and write
27F09178000
heap
page read and write
39AB1BE000
stack
page read and write
1928F6F7000
trusted library allocation
page read and write
19289361000
trusted library allocation
page read and write
192881A4000
trusted library allocation
page read and write
192FFF26000
trusted library allocation
page read and write
19286B8B000
trusted library allocation
page read and write
19290AF3000
trusted library allocation
page read and write
1928EF87000
trusted library allocation
page read and write
192884B0000
trusted library allocation
page read and write
1928699A000
trusted library allocation
page read and write
1928435C000
heap
page read and write
19289647000
trusted library allocation
page read and write
192FDA8A000
heap
page read and write
27F09179000
heap
page read and write
19286BD6000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
1928899B000
trusted library allocation
page read and write
1928F253000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192932A5000
trusted library allocation
page read and write
19292DBC000
trusted library allocation
page read and write
17838600000
trusted library allocation
page read and write
192FDA28000
heap
page read and write
19286963000
trusted library allocation
page read and write
192882BA000
trusted library allocation
page read and write
1928840B000
trusted library allocation
page read and write
1929008A000
trusted library allocation
page read and write
192887C9000
trusted library allocation
page read and write
1928F21E000
trusted library allocation
page read and write
192867D9000
trusted library allocation
page read and write
19290A65000
trusted library allocation
page read and write
192FDA0E000
heap
page read and write
19283D76000
trusted library allocation
page read and write
192FDA73000
heap
page read and write
19282C00000
trusted library allocation
page read and write
192FDA8F000
heap
page read and write
192FDA62000
heap
page read and write
1928A4E6000
trusted library allocation
page read and write
19292DF2000
trusted library allocation
page read and write
19287BE3000
trusted library allocation
page read and write
19288775000
trusted library allocation
page read and write
192907B4000
trusted library allocation
page read and write
192FFE76000
trusted library allocation
page read and write
1928F34D000
trusted library allocation
page read and write
1928699C000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
1928FC79000
trusted library allocation
page read and write
1928703D000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
7774BFE000
stack
page read and write
1928F2C5000
trusted library allocation
page read and write
1928F191000
trusted library allocation
page read and write
192896A8000
trusted library allocation
page read and write
1929315C000
trusted library allocation
page read and write
19290AAE000
trusted library allocation
page read and write
1928F1C7000
trusted library allocation
page read and write
19293292000
trusted library allocation
page read and write
192FDA65000
heap
page read and write
19292AE6000
trusted library allocation
page read and write
1928F309000
trusted library allocation
page read and write
1DB9B9A0000
heap
page read and write
19290AD6000
trusted library allocation
page read and write
192900F1000
trusted library allocation
page read and write
19292DCA000
trusted library allocation
page read and write
192872F8000
trusted library allocation
page read and write
19288622000
trusted library allocation
page read and write
192882FA000
trusted library allocation
page read and write
19292D88000
trusted library allocation
page read and write
223A8860000
heap
page read and write
192FDA11000
heap
page read and write
1928F6DF000
trusted library allocation
page read and write
27F0906C000
heap
page read and write
19288C91000
trusted library allocation
page read and write
192874D5000
trusted library allocation
page read and write
1928935D000
trusted library allocation
page read and write
19292D91000
trusted library allocation
page read and write
223A870A000
trusted library allocation
page read and write
19290050000
trusted library allocation
page read and write
19292DCA000
trusted library allocation
page read and write
1928A11E000
trusted library allocation
page read and write
1928A906000
trusted library allocation
page read and write
1928A366000
trusted library allocation
page read and write
192FDA70000
heap
page read and write
19288199000
trusted library allocation
page read and write
192843FE000
heap
page read and write
19287039000
trusted library allocation
page read and write
19292D8F000
trusted library allocation
page read and write
19292D83000
trusted library allocation
page read and write
19289335000
trusted library allocation
page read and write
192FDA24000
heap
page read and write
1928F0D6000
trusted library allocation
page read and write
19290AC6000
trusted library allocation
page read and write
1928F148000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
19283DC7000
trusted library allocation
page read and write
27F090F1000
heap
page read and write
1929335D000
heap
page read and write
F891B8E000
stack
page read and write
1928A4B9000
trusted library allocation
page read and write
1929311B000
trusted library allocation
page read and write
19286CE0000
trusted library allocation
page read and write
192FDA18000
heap
page read and write
192FDA64000
heap
page read and write
19290A7B000
trusted library allocation
page read and write
192FDA18000
heap
page read and write
22277F00000
trusted library allocation
page read and write
192927C4000
trusted library allocation
page read and write
192898CC000
trusted library allocation
page read and write
192933B6000
heap
page read and write
19288495000
trusted library allocation
page read and write
19292DA7000
trusted library allocation
page read and write
1928F139000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192882C5000
trusted library allocation
page read and write
1928813B000
trusted library allocation
page read and write
192FDA18000
heap
page read and write
22278063000
trusted library allocation
page read and write
1DB9B9B0000
heap
page read and write
1928877F000
trusted library allocation
page read and write
192893D3000
trusted library allocation
page read and write
22278082000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
1928A473000
trusted library allocation
page read and write
192931A6000
trusted library allocation
page read and write
19284383000
heap
page read and write
D9E000
heap
page read and write
1928EF83000
trusted library allocation
page read and write
19292DDA000
trusted library allocation
page read and write
1928875A000
trusted library allocation
page read and write
1928A4D4000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
19292773000
trusted library allocation
page read and write
1929334D000
heap
page read and write
1928A4F5000
trusted library allocation
page read and write
1928697E000
trusted library allocation
page read and write
1928A4D4000
trusted library allocation
page read and write
17838760000
trusted library allocation
page read and write
19288486000
trusted library allocation
page read and write
192841CA000
trusted library allocation
page read and write
77754BD000
stack
page read and write
1928876E000
trusted library allocation
page read and write
19292C9A000
trusted library allocation
page read and write
C287DFE000
stack
page read and write
1928F1E2000
trusted library allocation
page read and write
19292D4B000
trusted library allocation
page read and write
192884F6000
trusted library allocation
page read and write
19284383000
heap
page read and write
1928F34D000
trusted library allocation
page read and write
192FDA0A000
heap
page read and write
2227805F000
trusted library allocation
page read and write
19286CFA000
trusted library allocation
page read and write
1928F24A000
trusted library allocation
page read and write
19287076000
trusted library allocation
page read and write
192887ED000
trusted library allocation
page read and write
19292BE1000
trusted library allocation
page read and write
19290A7F000
trusted library allocation
page read and write
19287074000
trusted library allocation
page read and write
1928EF5A000
trusted library allocation
page read and write
192884B0000
trusted library allocation
page read and write
1929001D000
trusted library allocation
page read and write
192887CF000
trusted library allocation
page read and write
DBD000
heap
page read and write
192843FE000
heap
page read and write
192FDA85000
heap
page read and write
27F08F0D000
trusted library allocation
page read and write
19286CD0000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
192882ED000
trusted library allocation
page read and write
19288462000
trusted library allocation
page read and write
1928A886000
trusted library allocation
page read and write
777557E000
unkown
page readonly
19291900000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
192873D2000
trusted library allocation
page read and write
17838313000
heap
page read and write
192FDA6A000
heap
page read and write
192927FB000
trusted library allocation
page read and write
19286B87000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
192887CD000
trusted library allocation
page read and write
DBD000
heap
page read and write
192FDA79000
heap
page read and write
192FDA62000
heap
page read and write
1928F0A7000
trusted library allocation
page read and write
1928EF6D000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
1928A4E1000
trusted library allocation
page read and write
19283CDF000
trusted library allocation
page read and write
19292DC8000
trusted library allocation
page read and write
192907F0000
trusted library allocation
page read and write
19292A67000
trusted library allocation
page read and write
1928F274000
trusted library allocation
page read and write
1928F1D5000
trusted library allocation
page read and write
19287E9F000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192FDA5A000
heap
page read and write
192FDA11000
heap
page read and write
19290A89000
trusted library allocation
page read and write
19288913000
trusted library allocation
page read and write
192892B8000
trusted library allocation
page read and write
19292DE4000
trusted library allocation
page read and write
1928F4FB000
trusted library allocation
page read and write
1929329D000
trusted library allocation
page read and write
1928435A000
heap
page read and write
1928A346000
trusted library allocation
page read and write
19292DD4000
trusted library allocation
page read and write
192FFFDA000
trusted library allocation
page read and write
19286B21000
trusted library allocation
page read and write
19290A78000
trusted library allocation
page read and write
27F0907D000
heap
page read and write
5F4000
heap
page read and write
1928F3CD000
trusted library allocation
page read and write
1928EFB3000
trusted library allocation
page read and write
1928705C000
trusted library allocation
page read and write
1928849D000
trusted library allocation
page read and write
19292D80000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192FDA85000
heap
page read and write
1928EF65000
trusted library allocation
page read and write
192927E3000
trusted library allocation
page read and write
19292B9F000
trusted library allocation
page read and write
1783870D000
trusted library allocation
page read and write
192FDA28000
heap
page read and write
1928F1E2000
trusted library allocation
page read and write
192931BE000
trusted library allocation
page read and write
1928F5A2000
trusted library allocation
page read and write
19284156000
trusted library allocation
page read and write
192FDA38000
heap
page read and write
192FFF80000
trusted library allocation
page read and write
192881E6000
trusted library allocation
page read and write
192873D1000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192873C1000
trusted library allocation
page read and write
19288233000
trusted library allocation
page read and write
1928A4B9000
trusted library allocation
page read and write
3493F0303000
trusted library allocation
page read and write
192FDA80000
heap
page read and write
27F08060000
unclassified section
page readonly
440000
unkown
page readonly
19288644000
trusted library allocation
page read and write
19286CD9000
trusted library allocation
page read and write
192FFC54000
trusted library allocation
page read and write
19286CE4000
trusted library allocation
page read and write
19290A5D000
trusted library allocation
page read and write
192887C9000
trusted library allocation
page read and write
19290AA8000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192FDA80000
heap
page read and write
1928F3D4000
trusted library allocation
page read and write
192843FE000
heap
page read and write
27F09159000
heap
page read and write
19286B57000
trusted library allocation
page read and write
1928822D000
trusted library allocation
page read and write
1928814B000
trusted library allocation
page read and write
19292D4B000
trusted library allocation
page read and write
19287344000
trusted library allocation
page read and write
17838783000
trusted library allocation
page read and write
19293A50000
trusted library allocation
page read and write
192893BF000
trusted library allocation
page read and write
192FDA73000
heap
page read and write
192889FB000
trusted library allocation
page read and write
1928F1AE000
trusted library allocation
page read and write
192FDA15000
heap
page read and write
192FDA8C000
heap
page read and write
19292DBA000
trusted library allocation
page read and write
19292CBE000
trusted library allocation
page read and write
27F090B9000
heap
page read and write
192FDA74000
heap
page read and write
19286CCC000
trusted library allocation
page read and write
192889B6000
trusted library allocation
page read and write
1928F43A000
trusted library allocation
page read and write
1929335B000
heap
page read and write
1928695F000
trusted library allocation
page read and write
192927D0000
trusted library allocation
page read and write
19287047000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19290A8C000
trusted library allocation
page read and write
27F08A50000
trusted library allocation
page read and write
178385A0000
unclassified section
page readonly
19292D44000
trusted library allocation
page read and write
192881FB000
trusted library allocation
page read and write
1928FCBD000
trusted library allocation
page read and write
192841FB000
trusted library allocation
page read and write
192870F9000
trusted library allocation
page read and write
19289230000
trusted library allocation
page read and write
1929319E000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
1928F2DF000
trusted library allocation
page read and write
1928A3F3000
trusted library allocation
page read and write
1929334D000
heap
page read and write
1929334C000
heap
page read and write
19288735000
trusted library allocation
page read and write
192FDA26000
heap
page read and write
19286CC6000
trusted library allocation
page read and write
1928F19D000
trusted library allocation
page read and write
192887C3000
trusted library allocation
page read and write
1929279C000
trusted library allocation
page read and write
1928735D000
trusted library allocation
page read and write
19288BFD000
trusted library allocation
page read and write
19293307000
heap
page read and write
192FDA6E000
heap
page read and write
19288A78000
trusted library allocation
page read and write
19289211000
trusted library allocation
page read and write
1928F220000
trusted library allocation
page read and write
19288907000
trusted library allocation
page read and write
1928A1EA000
trusted library allocation
page read and write
19286CC1000
trusted library allocation
page read and write
19290A67000
trusted library allocation
page read and write
1929001D000
trusted library allocation
page read and write
192841FA000
trusted library allocation
page read and write
178387A1000
trusted library allocation
page read and write
19293A37000
trusted library allocation
page read and write
777553E000
stack
page read and write
1928EFCB000
trusted library allocation
page read and write
192896A1000
trusted library allocation
page read and write
1928F6E8000
trusted library allocation
page read and write
1928F420000
trusted library allocation
page read and write
192927B2000
trusted library allocation
page read and write
1928F346000
trusted library allocation
page read and write
1DB9B9BD000
heap
page read and write
19287BA7000
trusted library allocation
page read and write
1928F3A7000
trusted library allocation
page read and write
192886B2000
trusted library allocation
page read and write
50C000
unkown
page write copy
19288BF8000
trusted library allocation
page read and write
DC3000
heap
page read and write
19292D49000
trusted library allocation
page read and write
19283D93000
trusted library allocation
page read and write
1928F5DF000
trusted library allocation
page read and write
27F08365000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
1928F6C3000
trusted library allocation
page read and write
1928A19A000
trusted library allocation
page read and write
17838766000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928697B000
trusted library allocation
page read and write
19292C25000
trusted library allocation
page read and write
19288498000
trusted library allocation
page read and write
192886C5000
trusted library allocation
page read and write
192896E6000
trusted library allocation
page read and write
DA4000
heap
page read and write
1928699A000
trusted library allocation
page read and write
192900A7000
trusted library allocation
page read and write
192FDA8C000
heap
page read and write
1928A7C8000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
19288124000
trusted library allocation
page read and write
192873B7000
trusted library allocation
page read and write
19288656000
trusted library allocation
page read and write
192867FD000
trusted library allocation
page read and write
19290A65000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192927A5000
trusted library allocation
page read and write
192FDA8B000
heap
page read and write
1928733E000
trusted library allocation
page read and write
1928F46B000
trusted library allocation
page read and write
1928745A000
trusted library allocation
page read and write
19292D63000
trusted library allocation
page read and write
1928412F000
trusted library allocation
page read and write
1928F598000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
192898F6000
trusted library allocation
page read and write
1929279C000
trusted library allocation
page read and write
192927E3000
trusted library allocation
page read and write
1928F1B9000
trusted library allocation
page read and write
22278049000
trusted library allocation
page read and write
192897F6000
trusted library allocation
page read and write
19292D68000
trusted library allocation
page read and write
2227807A000
trusted library allocation
page read and write
19286CFA000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
192FDA22000
heap
page read and write
19293167000
trusted library allocation
page read and write
DBD000
heap
page read and write
1928827D000
trusted library allocation
page read and write
19287067000
trusted library allocation
page read and write
19287315000
trusted library allocation
page read and write
19288230000
trusted library allocation
page read and write
1928F1E2000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19292AA1000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
192870FC000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
19286984000
trusted library allocation
page read and write
1928EF83000
trusted library allocation
page read and write
22278104000
heap
page read and write
192FDA0A000
heap
page read and write
192912F6000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1929334C000
heap
page read and write
17838370000
remote allocation
page read and write
192FDA62000
heap
page read and write
19292C98000
trusted library allocation
page read and write
19292BE5000
trusted library allocation
page read and write
192FDA57000
heap
page read and write
19292D88000
trusted library allocation
page read and write
27F090FC000
heap
page read and write
1783872E000
trusted library allocation
page read and write
19290A7B000
trusted library allocation
page read and write
192FDA70000
heap
page read and write
1928FCA4000
trusted library allocation
page read and write
1928ACB3000
trusted library allocation
page read and write
1928A44B000
trusted library allocation
page read and write
19288604000
trusted library allocation
page read and write
19288BF8000
trusted library allocation
page read and write
19290AB6000
trusted library allocation
page read and write
1928F1F8000
trusted library allocation
page read and write
192927C8000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
19293303000
heap
page read and write
192FDA62000
heap
page read and write
192927C8000
trusted library allocation
page read and write
192887C7000
trusted library allocation
page read and write
192FDA20000
heap
page read and write
19287041000
trusted library allocation
page read and write
1928A3E2000
trusted library allocation
page read and write
19292B45000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192FDA70000
heap
page read and write
19293292000
trusted library allocation
page read and write
19292DBA000
trusted library allocation
page read and write
1928F1F4000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192FDA64000
heap
page read and write
192FDA0B000
heap
page read and write
192FDA86000
heap
page read and write
192FDA5C000
heap
page read and write
19287074000
trusted library allocation
page read and write
192FFFE2000
trusted library allocation
page read and write
441000
unkown
page execute read
192FDA83000
heap
page read and write
192909EE000
trusted library allocation
page read and write
192881F6000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
19284380000
heap
page read and write
192880EF000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
1928F1F4000
trusted library allocation
page read and write
19284360000
heap
page read and write
19293223000
trusted library allocation
page read and write
19283DF6000
trusted library allocation
page read and write
19287475000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
19292DCA000
trusted library allocation
page read and write
19288C63000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
192FFB75000
trusted library allocation
page read and write
1928F19A000
trusted library allocation
page read and write
27F09001000
heap
page read and write
192867C3000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
192FDA4E000
heap
page read and write
1929311B000
trusted library allocation
page read and write
1928437D000
heap
page read and write
22278400000
trusted library allocation
page read and write
19286BD6000
trusted library allocation
page read and write
192887E2000
trusted library allocation
page read and write
1928EF83000
trusted library allocation
page read and write
22278076000
trusted library allocation
page read and write
1928F1C2000
trusted library allocation
page read and write
1928F3B6000
trusted library allocation
page read and write
19286C5C000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192893D3000
trusted library allocation
page read and write
1928A4C4000
trusted library allocation
page read and write
192FDA75000
heap
page read and write
1928F34D000
trusted library allocation
page read and write
1929316A000
trusted library allocation
page read and write
192884E5000
trusted library allocation
page read and write
192886AB000
trusted library allocation
page read and write
19283DC7000
trusted library allocation
page read and write
192FDA65000
heap
page read and write
1928F3D4000
trusted library allocation
page read and write
19288123000
trusted library allocation
page read and write
19289363000
trusted library allocation
page read and write
19286931000
trusted library allocation
page read and write
192FDA8A000
heap
page read and write
192FDA8B000
heap
page read and write
19288419000
trusted library allocation
page read and write
192FDA65000
heap
page read and write
1928749D000
trusted library allocation
page read and write
19288A3D000
trusted library allocation
page read and write
1928F3DF000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
1928824B000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
27F09145000
heap
page read and write
192883E5000
trusted library allocation
page read and write
19292D9E000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
1928F5E3000
trusted library allocation
page read and write
19293A8A000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
19286CCD000
trusted library allocation
page read and write
27F090FC000
heap
page read and write
19292D3D000
trusted library allocation
page read and write
19293357000
heap
page read and write
192893E0000
trusted library allocation
page read and write
1928FCB7000
trusted library allocation
page read and write
192FDA38000
heap
page read and write
D4E000
stack
page read and write
19286776000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19292AFC000
trusted library allocation
page read and write
1928EFC7000
trusted library allocation
page read and write
192FDA70000
heap
page read and write
192931C0000
trusted library allocation
page read and write
192889FE000
trusted library allocation
page read and write
27F0839F000
trusted library allocation
page read and write
19292D44000
trusted library allocation
page read and write
19292D46000
trusted library allocation
page read and write
1928414A000
trusted library allocation
page read and write
192886EF000
trusted library allocation
page read and write
192FDA8C000
heap
page read and write
222780C4000
trusted library allocation
page read and write
19289382000
trusted library allocation
page read and write
19288769000
trusted library allocation
page read and write
22278110000
unclassified section
page read and write
192FDA81000
heap
page read and write
192869BD000
trusted library allocation
page read and write
192FFE23000
trusted library allocation
page read and write
19283CCB000
trusted library allocation
page read and write
19288BF8000
trusted library allocation
page read and write
192843FE000
heap
page read and write
1DB99D50000
heap
page read and write
19288256000
trusted library allocation
page read and write
192FDA8A000
heap
page read and write
192FDA80000
heap
page read and write
19286BA7000
trusted library allocation
page read and write
27F0905C000
heap
page read and write
F580B41000
trusted library allocation
page execute read
19283C9A000
trusted library allocation
page read and write
1928818D000
trusted library allocation
page read and write
192884E0000
trusted library allocation
page read and write
1928875A000
trusted library allocation
page read and write
22278106000
heap
page read and write
192887EC000
trusted library allocation
page read and write
19288082000
trusted library allocation
page read and write
192FDA8C000
heap
page read and write
1928435C000
heap
page read and write
1928F46B000
trusted library allocation
page read and write
192886AB000
trusted library allocation
page read and write
1928A4C0000
trusted library allocation
page read and write
192882C3000
trusted library allocation
page read and write
19290A11000
trusted library allocation
page read and write
1928F1E0000
trusted library allocation
page read and write
192873B9000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
19288754000
trusted library allocation
page read and write
19292DCC000
trusted library allocation
page read and write
19289326000
trusted library allocation
page read and write
1928F3F5000
trusted library allocation
page read and write
27F09178000
heap
page read and write
19292D99000
trusted library allocation
page read and write
1928F239000
trusted library allocation
page read and write
192873EA000
trusted library allocation
page read and write
19293301000
heap
page read and write
192FFC2D000
trusted library allocation
page read and write
C2865FA000
stack
page read and write
192880A7000
trusted library allocation
page read and write
1929335D000
heap
page read and write
192843FE000
heap
page read and write
192887E2000
trusted library allocation
page read and write
192FFCE4000
trusted library allocation
page read and write
27F09178000
heap
page read and write
19290A89000
trusted library allocation
page read and write
192FDA64000
heap
page read and write
19292C53000
trusted library allocation
page read and write
19287488000
trusted library allocation
page read and write
19290768000
trusted library allocation
page read and write
19283DA1000
trusted library allocation
page read and write
192911DF000
trusted library allocation
page read and write
C288DFF000
stack
page read and write
19287076000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
1928437D000
heap
page read and write
19284360000
heap
page read and write
192FDA16000
heap
page read and write
192881A5000
trusted library allocation
page read and write
1928811E000
trusted library allocation
page read and write
192893CA000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
19292DCC000
trusted library allocation
page read and write
19287034000
trusted library allocation
page read and write
1928730E000
trusted library allocation
page read and write
1928F0EF000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
19290A43000
trusted library allocation
page read and write
1928ACAE000
trusted library allocation
page read and write
192FDA86000
heap
page read and write
1928A374000
trusted library allocation
page read and write
1929322E000
trusted library allocation
page read and write
19286EF0000
trusted library allocation
page read and write
19287347000
trusted library allocation
page read and write
19288633000
trusted library allocation
page read and write
1928891B000
trusted library allocation
page read and write
19286CAA000
trusted library allocation
page read and write
19290A17000
trusted library allocation
page read and write
258E7FF000
stack
page read and write
1928A4EE000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
1928435C000
heap
page read and write
1928A72F000
trusted library allocation
page read and write
27F08381000
trusted library allocation
page read and write
192873B7000
trusted library allocation
page read and write
1DB99F00000
trusted library allocation
page read and write
192FDA11000
heap
page read and write
19288216000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
192FFC11000
trusted library allocation
page read and write
192873B0000
trusted library allocation
page read and write
19292DE9000
trusted library allocation
page read and write
1928931D000
trusted library allocation
page read and write
19287441000
trusted library allocation
page read and write
192FFE2F000
trusted library allocation
page read and write
19292DC5000
trusted library allocation
page read and write
192907C6000
trusted library allocation
page read and write
27F08F00000
trusted library allocation
page read and write
1928FC1E000
trusted library allocation
page read and write
19293362000
heap
page read and write
27F08303000
trusted library allocation
page read and write
19288489000
trusted library allocation
page read and write
19286971000
trusted library allocation
page read and write
192884BA000
trusted library allocation
page read and write
192FDAAE000
heap
page read and write
192FDA5C000
heap
page read and write
192FFC6D000
trusted library allocation
page read and write
192FDA77000
heap
page read and write
192FFDF0000
trusted library allocation
page read and write
19287072000
trusted library allocation
page read and write
19286CA3000
trusted library allocation
page read and write
1928A786000
trusted library allocation
page read and write
1DB9A100000
trusted library allocation
page read and write
1929335D000
heap
page read and write
2227800C000
trusted library allocation
page read and write
1928A4C0000
trusted library allocation
page read and write
1928877A000
trusted library allocation
page read and write
192927E3000
trusted library allocation
page read and write
19287081000
trusted library allocation
page read and write
192FFC81000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
DAB000
heap
page read and write
50C000
unkown
page read and write
192FFBB3000
trusted library allocation
page read and write
192FDA6A000
heap
page read and write
1928876E000
trusted library allocation
page read and write
192FDAD2000
heap
page read and write
19283CA5000
trusted library allocation
page read and write
1928F5AA000
trusted library allocation
page read and write
1929004E000
trusted library allocation
page read and write
19283CAA000
trusted library allocation
page read and write
192FDA74000
heap
page read and write
192FDA6B000
heap
page read and write
36A1000
heap
page read and write
19283E2A000
trusted library allocation
page read and write
192FDA82000
heap
page read and write
D96000
heap
page read and write
DC6000
heap
page read and write
19288769000
trusted library allocation
page read and write
19290AC6000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
1928683D000
trusted library allocation
page read and write
19288428000
trusted library allocation
page read and write
19283DDC000
trusted library allocation
page read and write
19286854000
trusted library allocation
page read and write
192FDA25000
heap
page read and write
19288A86000
trusted library allocation
page read and write
1928706F000
trusted library allocation
page read and write
192FDA77000
heap
page read and write
1928932F000
trusted library allocation
page read and write
1928F482000
trusted library allocation
page read and write
1929333A000
heap
page read and write
19292D43000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
192FDA80000
heap
page read and write
27F09159000
heap
page read and write
27F090E9000
heap
page read and write
192FFB98000
trusted library allocation
page read and write
19284357000
heap
page read and write
192FDA5D000
heap
page read and write
1929009C000
trusted library allocation
page read and write
1DB99D40000
heap
page read and write
192874E7000
trusted library allocation
page read and write
178387AB000
trusted library allocation
page read and write
1929334C000
heap
page read and write
1928F32B000
trusted library allocation
page read and write
192FFF66000
trusted library allocation
page read and write
19288461000
trusted library allocation
page read and write
192873BC000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
192927F1000
trusted library allocation
page read and write
1928692E000
trusted library allocation
page read and write
192FFB5F000
trusted library allocation
page read and write
19287347000
trusted library allocation
page read and write
27F0844F000
unclassified section
page read and write
19290A6E000
trusted library allocation
page read and write
DB1000
heap
page read and write
27F0916A000
heap
page read and write
192FDA6D000
heap
page read and write
192FDA74000
heap
page read and write
192FDA0A000
heap
page read and write
19292DF2000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
192886AD000
trusted library allocation
page read and write
19289685000
trusted library allocation
page read and write
19287B77000
trusted library allocation
page read and write
192881FB000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
192FFCDF000
trusted library allocation
page read and write
19286BA7000
trusted library allocation
page read and write
192927C4000
trusted library allocation
page read and write
1783876E000
trusted library allocation
page read and write
1928435D000
heap
page read and write
192FDA18000
heap
page read and write
192931DE000
trusted library allocation
page read and write
27F08A67000
unkown
page execute read
1928708A000
trusted library allocation
page read and write
27F08300000
trusted library allocation
page read and write
192931CF000
trusted library allocation
page read and write
19286EE6000
trusted library allocation
page read and write
1928F3CE000
trusted library allocation
page read and write
1928412F000
trusted library allocation
page read and write
192FDA5C000
heap
page read and write
22277CA0000
unclassified section
page readonly
19292A7E000
trusted library allocation
page read and write
1928F258000
trusted library allocation
page read and write
1928F237000
trusted library allocation
page read and write
19283CE7000
trusted library allocation
page read and write
192FDA70000
heap
page read and write
19292DBC000
trusted library allocation
page read and write
7776D7E000
stack
page read and write
19292C2B000
trusted library allocation
page read and write
22278100000
heap
page read and write
1929279C000
trusted library allocation
page read and write
192912F6000
trusted library allocation
page read and write
192931B2000
trusted library allocation
page read and write
1928A8AC000
trusted library allocation
page read and write
19283D6E000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
19287B68000
trusted library allocation
page read and write
192873BC000
trusted library allocation
page read and write
192884E0000
trusted library allocation
page read and write
1928A1E8000
trusted library allocation
page read and write
19292D9D000
trusted library allocation
page read and write
192886FB000
trusted library allocation
page read and write
19289685000
trusted library allocation
page read and write
19290AA3000
trusted library allocation
page read and write
19292DBA000
trusted library allocation
page read and write
192FFCF0000
trusted library allocation
page read and write
192884B0000
trusted library allocation
page read and write
22278030000
trusted library allocation
page read and write
1928EFB3000
trusted library allocation
page read and write
1928F247000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
19288408000
trusted library allocation
page read and write
19286761000
trusted library allocation
page read and write
1928A92C000
trusted library allocation
page read and write
192931A6000
trusted library allocation
page read and write
22277D20000
unclassified section
page readonly
19284380000
heap
page read and write
1928ACD7000
trusted library allocation
page read and write
192872EB000
trusted library allocation
page read and write
19283D99000
trusted library allocation
page read and write
1928EF9F000
trusted library allocation
page read and write
192931B2000
trusted library allocation
page read and write
BCE000
stack
page read and write
1928697E000
trusted library allocation
page read and write
1928F1A2000
trusted library allocation
page read and write
192884C3000
trusted library allocation
page read and write
1928A8A3000
trusted library allocation
page read and write
19290052000
trusted library allocation
page read and write
192FDA81000
heap
page read and write
19288282000
trusted library allocation
page read and write
19292C9C000
trusted library allocation
page read and write
1928A4E1000
trusted library allocation
page read and write
192887BD000
trusted library allocation
page read and write
19284372000
heap
page read and write
27F0913C000
heap
page read and write
19290925000
trusted library allocation
page read and write
19290AAC000
trusted library allocation
page read and write
1928F430000
trusted library allocation
page read and write
1928935F000
trusted library allocation
page read and write
192892CC000
trusted library allocation
page read and write
1929129E000
trusted library allocation
page read and write
192882F0000
trusted library allocation
page read and write
1928415D000
trusted library allocation
page read and write
192933A6000
heap
page read and write
192FDA25000
heap
page read and write
19284383000
heap
page read and write
1928A4BC000
trusted library allocation
page read and write
1928415D000
trusted library allocation
page read and write
39AA97E000
stack
page read and write
192FDA81000
heap
page read and write
19288769000
trusted library allocation
page read and write
27F08200000
trusted library allocation
page read and write
39AB1FE000
unkown
page readonly
1928877A000
trusted library allocation
page read and write
1929007E000
trusted library allocation
page read and write
17838922000
trusted library allocation
page read and write
192FDA5A000
heap
page read and write
192927B2000
trusted library allocation
page read and write
19292DFB000
trusted library allocation
page read and write
19290AC6000
trusted library allocation
page read and write
1928A957000
trusted library allocation
page read and write
192FDA80000
heap
page read and write
192FFC2A000
trusted library allocation
page read and write
192FDA85000
heap
page read and write
27F083B3000
trusted library allocation
page read and write
192873B0000
trusted library allocation
page read and write
1929092C000
trusted library allocation
page read and write
27F09060000
heap
page read and write
192FDA5C000
heap
page read and write
192FDA6B000
heap
page read and write
192FDA0A000
heap
page read and write
27F09100000
heap
page read and write
17838510000
heap
page read and write
192FFC8A000
trusted library allocation
page read and write
192FDA22000
heap
page read and write
192907F4000
trusted library allocation
page read and write
192911C5000
trusted library allocation
page read and write
1928F5C4000
trusted library allocation
page read and write
192FDA62000
heap
page read and write
19288274000
trusted library allocation
page read and write
192FDA2E000
heap
page read and write
1928F59B000
trusted library allocation
page read and write
19293362000
heap
page read and write
192FDA7C000
heap
page read and write
19288486000
trusted library allocation
page read and write
19286913000
trusted library allocation
page read and write
19288822000
trusted library allocation
page read and write
192911BF000
trusted library allocation
page read and write
192907AA000
trusted library allocation
page read and write
19288AA0000
trusted library allocation
page read and write
1928A470000
trusted library allocation
page read and write
1928A4D4000
trusted library allocation
page read and write
192907CF000
trusted library allocation
page read and write
1928A805000
trusted library allocation
page read and write
1928F0D6000
trusted library allocation
page read and write
1928F427000
trusted library allocation
page read and write
19283D95000
trusted library allocation
page read and write
19293362000
heap
page read and write
1DB9B9AC000
heap
page read and write
19284372000
heap
page read and write
19288A42000
trusted library allocation
page read and write
19286BA0000
trusted library allocation
page read and write
192FDA4E000
heap
page read and write
192FFBB7000
trusted library allocation
page read and write
1928898B000
trusted library allocation
page read and write
1928F6E8000
trusted library allocation
page read and write
19288993000
trusted library allocation
page read and write
17838310000
heap
page read and write
1928846A000
trusted library allocation
page read and write
192FDA57000
heap
page read and write
192FDA6E000
heap
page read and write
19284383000
heap
page read and write
C30000
heap
page read and write
192FDA22000
heap
page read and write
19288916000
trusted library allocation
page read and write
1928A31F000
trusted library allocation
page read and write
19288275000
trusted library allocation
page read and write
19286EFD000
trusted library allocation
page read and write
192FDA6B000
heap
page read and write
192FFBBF000
trusted library allocation
page read and write
192873BF000
trusted library allocation
page read and write
5F4000
heap
page read and write
192FDA6D000
heap
page read and write
There are 3821 hidden memdumps, click here to show them.